www.internetsociety.org
“SECURITY” IN A DIGITAL INTERCONNECTED
WORLD
Central Asian Internet Symposium, Bishkek
10 December 2014
The Internet Society 9 August 201422
Image from Wikimedia Commons: The Opte Project
The Internet Society
The Internet invariants
9 October 20143
 Global connectivity and integrity
– Global reach and consistent view
from any point
 Permission-free innovation
– Yet undiscovered functionality
 Accessibility
– Anyone can contribute and
become part of it
 Spirit of cooperation
– Foundation for evolution and
resiliency
The Internet Society
The complexity of the security landscape
9 October 20144
 Open platform
– open for attack and intrusion
 Permission-free innovation
– development and deployment
of malware
 Global reach
– attacks and cybercrime are
cross-border
 Voluntary collaboration
– hard to mandate
The Internet Society
5
Users Expectations: trust
User trust in networks,
devices, and transactions
essential in driving social
and commercial
interaction
Security, Stability,
Confidentiality,
Integrity, Resiliency
and Scalability are
tools to achieve trust
The Internet Society
Why do we care about “security”?
 We want to be “secure” and feel “secure” …
BUT …
Policy measures that are premised on stopping bad
things, rather than protecting what is valued, provide no
guide as to how far those measures should go.
AND …
If we are not careful, the spectre of cyber threats can
be used as a vehicle for control of networks and how they
are used, plus pervasive monitoring
9 October 20146
The Internet Society
Throw out preconceptions
9 October 20147
The Internet Society
Understanding security
 Security is not an end in itself
 There is no such thing as absolute security: there will
always be threats
 We need to think about “secure” in terms of residual risks
that are considered acceptable in a specific context.
 Resilience is key
 There are “inward” and “outward” risks
 Risks may require more than one actor to manage
 Collective and shared risk management
9 October 20148
The Internet Society
Resilience
9 October 20149
The Internet Society
Inward and outward risks
9 October 201410
The Internet Society 9 October 2014
The Internet Society
Ingredients for cybersecurity solutions
9 October 201412
 International cooperation
– Most of the issues are cross-border
 Preservation of Internet values
– A fine balance
 Technical foundation
– Solutions based on open standards
 Collaborative responsibility
– Industry self-regulation
The Internet Society
Things you can do as an operator
 Detect, close or protect open resolvers and other potential
amplifiers
 Deploy best practices aimed at improving routing hygiene
 Deploy anti-spoofing measures, preventing traffic with
spoofed source IP addresses
 Deploy DNSSEC (validation) to secure name resolution for
your customers
 Detect and mitigate infected and compromised devices on
your network
 Cooperate with other networks in detection,tracing back
and mitigation of attacks
9 October 201413
The Internet Society
What you can do as a government
 Foster a collective and shared risk management approach
to security that:
 draws from voluntary collaboration
 preserves the fundamental characteristics of the Internet (“the Internet
invariants”)
 furthers objectives that will benefit citizens (e.g. economic and social
prosperity, participation in a global community)
 preserves fundamental rights
 Focus on “cyber-resilience”
 Build trust not distrust
 Use the experience of your diverse stakeholders to
develop policy (“the multistakeholder approach”)
 Creatively use the range of tools in the policy toolbox
9 October 201414
The Internet Society
15
Example: Pervasive Monitoring
The Internet Society
Pervasive Monitoring
9 October 201416
Statistics, Web Traffic
• HTTPS increased 4% to 17% from 2008 to 2014,
for all web traffic (Source: IIJ)
Pain Points and Hot
Debates
• There is no single reason behind the increasing use of
encryption, but the change has a real impact on the
world
• Operator business models, technical solutions for
various things, censorship will be harder (both good
and bad kind), …
• All this will cause friction
• Motives of players are not fully aligned
Reality Check
• “Everything is in the clear” approach is clearly unworkable
• Encryption will reduce the number of parties that see traffic
• But not eliminate them — content provider, browser vendor, CAs, proxy
provider, corporate IT department, …
• World still moves ahead on a voluntary basis on what technology is
chosen and on what technology a particular party can adopt
• Surveillance shifts, not eliminated
• Useful technical things done in different ways, not eliminated
• Some potential bad outcomes to avoid —- MITMs, regulation limiting
security, fragmentation, device control, …
The Internet Society
20
Example: Routing Stability,
and Resilience
The Internet Society
Spotlight on a voluntary bottom-up
initiative
 The MANRS (Mutually Agreed Norms for Routing Security)
- https://www.routingmanifesto.org/manrs
 Defines a minimum package (“a set of commitments”)
 Raises awareness and encourages action through the
growing numbers of supporters
 Demonstrates that industry is able to address complex
issues, even where they may not directly benefit
 Clear and tangible message:
“WE DO AT LEAST THIS AND EXPECT YOU TO DO THE
SAME”
9 October 201421
The Internet Society
The MANRS … in more detail
 Principles of addressing issues of routing resilience
– Interdependence and reciprocity (including collaboration)
– Commitment to Best Practices
– Encouragement of customers and peers
 “The package” indicating the most important actions
– BGP Filtering
– Anti-spoofing
– Coordination and collaboration
 High-level document specifying “what”
– “How” is in external documents (e.g. BCPs)
9 October 201422
The Internet Society
Principles
1) The organization (ISP/network operator) recognizes the
interdependent nature of the global routing system and its
own role in contributing to a secure and resilient Internet
2) The organization integrates best current practices
related to routing security and resilience in its network
management processes in line with the Actions
3) The organization is committed to preventing, detecting
and mitigating routing incidents through collaboration and
coordination with peers and other ISPs in line with the
Actions
4) The organization encourages its customers and peers
to adopt these Principles and Actions
9 October 201423
The Internet Society
Good MANRS
 Prevent propagation of incorrect routing information
 Prevent traffic with spoofed source IP address
 Facilitate global operational communication and
coordination between the network operators
 Facilitate validation of routing information on a global
scale.
9 October 201424
The Internet Society
Participating in MANRS
1. The company supports the Principles and implements at
least one of the Expected Actions for the majority of its
infrastructure. Implemented Actions are marked with a
check-box.
2. The company becomes a Participant of MANRS, helping
to maintain and improve the document, for example, by
suggesting new Actions and maintaining an up-to-date
list of references to BCOPs and other documents with
more detailed implementation guidance.
3. This category is for network operators, or other entities
acting in this role (e.g. a network equipment vendor,
running its own network infrastructure)
12/18/201425
The Internet Society
Status update
9 October 201426
Launched 6 November 2014 with
9 participants
One month later: 14 participants.
Seeking committed network
operators.
Contact us:
routingmanifesto@isoc.org
or
https://www.routingmanifesto.org/c
ontact/
www.internetsociety.org
Contact: Olaf M. Kolkman <kolkman@isoc.org>
10 December 2014
The Internet Society
Acknowledgement
• Network topology map from ‘The Opte Project’
• Jari Arkko for the slides on the use on encryption
• Logos and Trademarks from the respective companies
28

More Related Content

PDF
Instituting_Wi-Fi_Policies
PDF
Global Anti-Abuse Working Groups: Trends and Current Work
PPTX
Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...
PPTX
Development of Jisc security programme - Networkshop44
ODP
Introduction to Internet Governance and Cyber-security
PDF
Two years of good MANRS
PPT
CyberSecurity-Forum-2010-Mario Hoffmann
PDF
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...
Instituting_Wi-Fi_Policies
Global Anti-Abuse Working Groups: Trends and Current Work
Beadles, Bilby, Digby, Leahy, Lloyd, and Pawlowski "Identity Management and A...
Development of Jisc security programme - Networkshop44
Introduction to Internet Governance and Cyber-security
Two years of good MANRS
CyberSecurity-Forum-2010-Mario Hoffmann
Nick Barcet, Open Source tijdens Infosecurity.nl Storage Expo en Tooling Even...

What's hot (20)

PPTX
NISO Roundtable Discussion, Cybersecurity, February 12 2020
PDF
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
PPTX
Dealing with pervasive monitoring - Networkshop44
PDF
Iot tunisia forum 2017 security, confidentiality and privacy in iot
PPTX
CTO-CybersecurityForum-2010-Richard Simpson
PDF
Good Practices and Recommendations on the Security and Resilience of Big Data...
PDF
Oxford cluster overview 160414
PDF
CTO Fellowship Report Presentation - Lusungu Mkandawire
PDF
BCS ITNow 201403 - Data Loss Prevention
PDF
Secure Use of Cloud Computing in the Finance Sector
PPTX
Tech 2 Tech: increasing security posture and threat intelligence sharing
PPT
CTO-CyberSecurityForum-2010-Charles Ward
PPTX
CTO Fellowship Report Presentation - Lusungu Mkandawire
PPTX
Dwyer "Privacy by Design: Can It Work?"
PPTX
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
PDF
National Strategies against Cyber Attacks - Philip Victor
PPT
CTO-CyberSecurityForum-2010-Anders Johanson
PPTX
Akolade data presentation by Paul O'Connor
PPTX
ION Cape Town - Collective Responsibility for Routing Security and MANRS
NISO Roundtable Discussion, Cybersecurity, February 12 2020
Michael Yakushev - ICANN accountability and IANA transition - ArmIGF2015
Dealing with pervasive monitoring - Networkshop44
Iot tunisia forum 2017 security, confidentiality and privacy in iot
CTO-CybersecurityForum-2010-Richard Simpson
Good Practices and Recommendations on the Security and Resilience of Big Data...
Oxford cluster overview 160414
CTO Fellowship Report Presentation - Lusungu Mkandawire
BCS ITNow 201403 - Data Loss Prevention
Secure Use of Cloud Computing in the Finance Sector
Tech 2 Tech: increasing security posture and threat intelligence sharing
CTO-CyberSecurityForum-2010-Charles Ward
CTO Fellowship Report Presentation - Lusungu Mkandawire
Dwyer "Privacy by Design: Can It Work?"
ION Hangzhou - Keynote: Collaborative Security and an Open Internet
National Strategies against Cyber Attacks - Philip Victor
CTO-CyberSecurityForum-2010-Anders Johanson
Akolade data presentation by Paul O'Connor
ION Cape Town - Collective Responsibility for Routing Security and MANRS
Ad

Viewers also liked (17)

PDF
Balancing Security and Customer Experience
PDF
Leveraging security to develop new digital banking models
PDF
Mobile Banking Security Risks and Consequences iovation2015
PPTX
E banking & security
PPTX
Agility, Business Continuity & Security in a Digital World: Can we have it all?
PPTX
E banking &amp; security concern
PPTX
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
ODP
Security In Internet Banking
PPT
ATM Frauds and Solutions
PPTX
E banking security
PPT
Atm security
PPTX
Banking Industry and Information Technology
PPTX
Ppt on atm machine
PPT
Tech developments in banking sector
PDF
ATM Awareness Guide
PDF
How ATM card skimming and PIN capturing scams work.
PPTX
Presentation on security feature of atm (2)
Balancing Security and Customer Experience
Leveraging security to develop new digital banking models
Mobile Banking Security Risks and Consequences iovation2015
E banking & security
Agility, Business Continuity & Security in a Digital World: Can we have it all?
E banking &amp; security concern
Joint Presentation - Part 1: The Future Evolution of E-Banking & Cyber Securi...
Security In Internet Banking
ATM Frauds and Solutions
E banking security
Atm security
Banking Industry and Information Technology
Ppt on atm machine
Tech developments in banking sector
ATM Awareness Guide
How ATM card skimming and PIN capturing scams work.
Presentation on security feature of atm (2)
Ad

Similar to “Security” In a Digital Interconnected World (20)

PPTX
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
PDF
ARM 7 - ISOC: MANRS, Security and resilience of global routing system
PDF
Collective responsibility for security and resilience of the global routing s...
PDF
How can we work together to improve security and resilience of the global rou...
PDF
Olaf Kolkman - FIRST Keynote on Collaborative Security
PDF
AusNOG - Two Years of Good MANRS
PPT
Isoc bishkek 2015 11-25
PDF
Engage with The Internet Society
PPTX
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
PDF
ISOC Update
PDF
What if public administration demanded educated MANRS from ISPs?
PPTX
ION Durban - MANRS Introduction
PDF
Improving routing security through concerted action
PPT
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
PDF
Internet Security, A Solid Foundation for Sustainable Internet Development
PPTX
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
PPTX
ION Malta - MANRS Introduction
PDF
Routing is at Risk - Let’s secure it together
PDF
MANRS for Network Operators - bdNOG12
PDF
Internet Security - A Solid Foundation for Sustainable Internet Development.
Mind Your MANRS: Improving the Security and Resilience of the Global Routing ...
ARM 7 - ISOC: MANRS, Security and resilience of global routing system
Collective responsibility for security and resilience of the global routing s...
How can we work together to improve security and resilience of the global rou...
Olaf Kolkman - FIRST Keynote on Collaborative Security
AusNOG - Two Years of Good MANRS
Isoc bishkek 2015 11-25
Engage with The Internet Society
ION Costa Rica - Two Years of Good MANRS: Improving Global Routing Security &...
ISOC Update
What if public administration demanded educated MANRS from ISPs?
ION Durban - MANRS Introduction
Improving routing security through concerted action
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
Internet Security, A Solid Foundation for Sustainable Internet Development
PLNOG 21: Andrei Robachevsky - Routing Is At Risk. Let's Secure It Together
ION Malta - MANRS Introduction
Routing is at Risk - Let’s secure it together
MANRS for Network Operators - bdNOG12
Internet Security - A Solid Foundation for Sustainable Internet Development.

More from Internet Society (20)

PPTX
IXP growth challenges in West Africa: The Ghana Experience
PPTX
IXP growth challenges in Central Africa
PPTX
Benin IX: 3 Years After!
PPT
IXP growth challenges in Côte D’Ivoire
PPTX
IXP Masterclass
PPTX
PeeringDB Updates
PPTX
Peering Personals #2
PPTX
Keynote Presentation : “80/20 by 2020”
PPT
International Bandwidth and Pricing Trends in Sub-Sahara Africa
PPTX
In Search of Low Cost Bandwidth
PPTX
IPv6 @ Cloudflare
PPTX
Interconnection Evolution
PPTX
Peering Personals #1
PPTX
“BIG” IXP Jedi and TraceMON: RIPE Atlas tools in Africa
PPTX
Looking for Latency Clusters in Africa's internet
PPT
Fantsuam: Ideas for the sustainability of Community Networks
PDF
Mawingu: Ideas for the sustainability of Community Networks
PPTX
Zenzeleni Networks Update Report
PPTX
Canadian Victory Garden: Overview of an Off Grid Solution
PPTX
TVWS use case in Kenya
IXP growth challenges in West Africa: The Ghana Experience
IXP growth challenges in Central Africa
Benin IX: 3 Years After!
IXP growth challenges in Côte D’Ivoire
IXP Masterclass
PeeringDB Updates
Peering Personals #2
Keynote Presentation : “80/20 by 2020”
International Bandwidth and Pricing Trends in Sub-Sahara Africa
In Search of Low Cost Bandwidth
IPv6 @ Cloudflare
Interconnection Evolution
Peering Personals #1
“BIG” IXP Jedi and TraceMON: RIPE Atlas tools in Africa
Looking for Latency Clusters in Africa's internet
Fantsuam: Ideas for the sustainability of Community Networks
Mawingu: Ideas for the sustainability of Community Networks
Zenzeleni Networks Update Report
Canadian Victory Garden: Overview of an Off Grid Solution
TVWS use case in Kenya

Recently uploaded (20)

PDF
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
PPTX
Basic understanding of cloud computing one need
PDF
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
PPTX
Basic_of_Computer_System.pptx class-8 com
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PDF
How Technology Shapes Our Information Age
PPTX
Introduction: Living in the IT ERA.pptx
PDF
JuanConnect E-Wallet Guide for new users.pdf
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PPTX
Viva Digitally Software-Defined Wide Area Network.pptx
DOCX
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
PPTX
Reading as a good Form of Recreation
PPTX
Partner to Customer - Sales Presentation_V23.01.pptx
PPTX
Edit gdasgdkhagfhgfgfasdghhdgfhdgfj.pptx
PPTX
Cyber Hygine IN organizations in MSME or
PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
PDF
Course Overview and Agenda cloud security
PPTX
Introduction to networking local area networking
PPTX
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
PDF
Public for study about wiring to confirm.
healthwealthtech4all-blogspot-com-2025-08-top-5-tech-innovations-that-will-ht...
Basic understanding of cloud computing one need
The_Decisive_Battle_of_Yarmuk,battle of yarmuk
Basic_of_Computer_System.pptx class-8 com
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
How Technology Shapes Our Information Age
Introduction: Living in the IT ERA.pptx
JuanConnect E-Wallet Guide for new users.pdf
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Viva Digitally Software-Defined Wide Area Network.pptx
Memecoinist Update: Best Meme Coins 2025, Trump Meme Coin Predictions, and th...
Reading as a good Form of Recreation
Partner to Customer - Sales Presentation_V23.01.pptx
Edit gdasgdkhagfhgfgfasdghhdgfhdgfj.pptx
Cyber Hygine IN organizations in MSME or
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
Course Overview and Agenda cloud security
Introduction to networking local area networking
购买林肯大学毕业证|i20Lincoln成绩单GPA修改本科毕业证书购买学历认证
Public for study about wiring to confirm.

“Security” In a Digital Interconnected World

  • 1. www.internetsociety.org “SECURITY” IN A DIGITAL INTERCONNECTED WORLD Central Asian Internet Symposium, Bishkek 10 December 2014
  • 2. The Internet Society 9 August 201422 Image from Wikimedia Commons: The Opte Project
  • 3. The Internet Society The Internet invariants 9 October 20143  Global connectivity and integrity – Global reach and consistent view from any point  Permission-free innovation – Yet undiscovered functionality  Accessibility – Anyone can contribute and become part of it  Spirit of cooperation – Foundation for evolution and resiliency
  • 4. The Internet Society The complexity of the security landscape 9 October 20144  Open platform – open for attack and intrusion  Permission-free innovation – development and deployment of malware  Global reach – attacks and cybercrime are cross-border  Voluntary collaboration – hard to mandate
  • 5. The Internet Society 5 Users Expectations: trust User trust in networks, devices, and transactions essential in driving social and commercial interaction Security, Stability, Confidentiality, Integrity, Resiliency and Scalability are tools to achieve trust
  • 6. The Internet Society Why do we care about “security”?  We want to be “secure” and feel “secure” … BUT … Policy measures that are premised on stopping bad things, rather than protecting what is valued, provide no guide as to how far those measures should go. AND … If we are not careful, the spectre of cyber threats can be used as a vehicle for control of networks and how they are used, plus pervasive monitoring 9 October 20146
  • 7. The Internet Society Throw out preconceptions 9 October 20147
  • 8. The Internet Society Understanding security  Security is not an end in itself  There is no such thing as absolute security: there will always be threats  We need to think about “secure” in terms of residual risks that are considered acceptable in a specific context.  Resilience is key  There are “inward” and “outward” risks  Risks may require more than one actor to manage  Collective and shared risk management 9 October 20148
  • 10. The Internet Society Inward and outward risks 9 October 201410
  • 11. The Internet Society 9 October 2014
  • 12. The Internet Society Ingredients for cybersecurity solutions 9 October 201412  International cooperation – Most of the issues are cross-border  Preservation of Internet values – A fine balance  Technical foundation – Solutions based on open standards  Collaborative responsibility – Industry self-regulation
  • 13. The Internet Society Things you can do as an operator  Detect, close or protect open resolvers and other potential amplifiers  Deploy best practices aimed at improving routing hygiene  Deploy anti-spoofing measures, preventing traffic with spoofed source IP addresses  Deploy DNSSEC (validation) to secure name resolution for your customers  Detect and mitigate infected and compromised devices on your network  Cooperate with other networks in detection,tracing back and mitigation of attacks 9 October 201413
  • 14. The Internet Society What you can do as a government  Foster a collective and shared risk management approach to security that:  draws from voluntary collaboration  preserves the fundamental characteristics of the Internet (“the Internet invariants”)  furthers objectives that will benefit citizens (e.g. economic and social prosperity, participation in a global community)  preserves fundamental rights  Focus on “cyber-resilience”  Build trust not distrust  Use the experience of your diverse stakeholders to develop policy (“the multistakeholder approach”)  Creatively use the range of tools in the policy toolbox 9 October 201414
  • 15. The Internet Society 15 Example: Pervasive Monitoring
  • 16. The Internet Society Pervasive Monitoring 9 October 201416
  • 17. Statistics, Web Traffic • HTTPS increased 4% to 17% from 2008 to 2014, for all web traffic (Source: IIJ)
  • 18. Pain Points and Hot Debates • There is no single reason behind the increasing use of encryption, but the change has a real impact on the world • Operator business models, technical solutions for various things, censorship will be harder (both good and bad kind), … • All this will cause friction • Motives of players are not fully aligned
  • 19. Reality Check • “Everything is in the clear” approach is clearly unworkable • Encryption will reduce the number of parties that see traffic • But not eliminate them — content provider, browser vendor, CAs, proxy provider, corporate IT department, … • World still moves ahead on a voluntary basis on what technology is chosen and on what technology a particular party can adopt • Surveillance shifts, not eliminated • Useful technical things done in different ways, not eliminated • Some potential bad outcomes to avoid —- MITMs, regulation limiting security, fragmentation, device control, …
  • 20. The Internet Society 20 Example: Routing Stability, and Resilience
  • 21. The Internet Society Spotlight on a voluntary bottom-up initiative  The MANRS (Mutually Agreed Norms for Routing Security) - https://www.routingmanifesto.org/manrs  Defines a minimum package (“a set of commitments”)  Raises awareness and encourages action through the growing numbers of supporters  Demonstrates that industry is able to address complex issues, even where they may not directly benefit  Clear and tangible message: “WE DO AT LEAST THIS AND EXPECT YOU TO DO THE SAME” 9 October 201421
  • 22. The Internet Society The MANRS … in more detail  Principles of addressing issues of routing resilience – Interdependence and reciprocity (including collaboration) – Commitment to Best Practices – Encouragement of customers and peers  “The package” indicating the most important actions – BGP Filtering – Anti-spoofing – Coordination and collaboration  High-level document specifying “what” – “How” is in external documents (e.g. BCPs) 9 October 201422
  • 23. The Internet Society Principles 1) The organization (ISP/network operator) recognizes the interdependent nature of the global routing system and its own role in contributing to a secure and resilient Internet 2) The organization integrates best current practices related to routing security and resilience in its network management processes in line with the Actions 3) The organization is committed to preventing, detecting and mitigating routing incidents through collaboration and coordination with peers and other ISPs in line with the Actions 4) The organization encourages its customers and peers to adopt these Principles and Actions 9 October 201423
  • 24. The Internet Society Good MANRS  Prevent propagation of incorrect routing information  Prevent traffic with spoofed source IP address  Facilitate global operational communication and coordination between the network operators  Facilitate validation of routing information on a global scale. 9 October 201424
  • 25. The Internet Society Participating in MANRS 1. The company supports the Principles and implements at least one of the Expected Actions for the majority of its infrastructure. Implemented Actions are marked with a check-box. 2. The company becomes a Participant of MANRS, helping to maintain and improve the document, for example, by suggesting new Actions and maintaining an up-to-date list of references to BCOPs and other documents with more detailed implementation guidance. 3. This category is for network operators, or other entities acting in this role (e.g. a network equipment vendor, running its own network infrastructure) 12/18/201425
  • 26. The Internet Society Status update 9 October 201426 Launched 6 November 2014 with 9 participants One month later: 14 participants. Seeking committed network operators. Contact us: [email protected] or https://www.routingmanifesto.org/c ontact/
  • 28. The Internet Society Acknowledgement • Network topology map from ‘The Opte Project’ • Jari Arkko for the slides on the use on encryption • Logos and Trademarks from the respective companies 28

Editor's Notes

  • #3: The open and global nature of the Internet, built on fundamental principles of open standards, voluntary collaboration, reusable building blocks, integrity, permission-free innovation and global reach, has enabled remarkable social and economic innovation in ways that we could never have imagined.   At the same time, using the Internet is not without risk. Malicious actors also see opportunities to gain benefit through fraud, to thwart the activities of others, inflict harm or other damage, and to generally cause mayhem.   It is important to appreciate that while malicious actors will exploit any opportunity, the Internet’s key characteristics are neither the origin nor the cause of the malicious activity.
  • #4: The Internet is global because any endpoint connected to it can address any other endpoint. The integrity of the Internet means that information received at one endpoint is as what was intended by the sender, wherever the receiver connects to the Internet
  • #8: Traditional approaches to security were principally concerned with external and internal threats, and the impact they may have on one’s own assets [in other words, threat-based and self-interested]. There is, however, a growing recognition that a security paradigm for the Internet ecosystem should be premised on protecting opportunities for economic and social prosperity, as opposed to a model that is based simply on preventing perceived harm.
  • #9: It’s the Economy… Challenge the idea that “security” has to be a trade-off between that which you want to do and having an acceptable level of security. Reasonably understood risks
  • #10: Like a human body that may suffer from viruses, but gets stronger and more resilient as a result, new technologies, solutions and collaborative efforts make the Internet more resilient to malicious activity.
  • #11: The Internet, with its high degree of interconnection and dependencies, brings another dimension to the management of risks. Security and resilience of the Internet depends not only on how well risks to you and your assets are managed, but also, importantly, on the management of risks that you (by your action or inaction) present to the Internet ecosystem – the “outward” risks. Additionally, some risks need to be managed by more than one actor. This is the notion of collective and shared risk management – a notion that is well aligned with the “public interest” nature of the Internet.   This latter aspect of risk management is not necessarily self-evident, especially since there is often no obviously identifiable immediate harm to the actors or their assets and, therefore, no direct business case that can be immediately associated with such effort. And, it also is human nature to seek outcomes that further our individual “self-interest”. However, such a narrow approach is counter-productive and, in the long-term, harmful to everyone’s interests – not only will it impact the security of the ecosystem, but it will also diminish the overall pool of social and economic potential that the Internet offers.
  • #15: In developing global solutions, we need to keep in mind all the governance arrangements that are available, not just treaties, and that there are cultural and other differences between countries.
  • #17: In developing global solutions, we need to keep in mind all the governance arrangements that are available, not just treaties, and that there are cultural and other differences between countries.
  • #25: Prevent propagation of incorrect routing information Network operator defines a clear routing policy and implements a system that ensures correctness of their own announcements and announcements from their customers to adjacent networks with prefix and AS-path granularity. Network operator is able to communicate to their adjacent networks which announcements are correct. Network operator applies due diligence when checking the correctness of their customer’s announcements, specifically that the customer legitimately holds the ASN and the address space it announces. Prevent traffic with spoofed source IP address Network operator implements a system that enables source address validation for at least single-homed stub customer networks, their own end-users and infrastructure. Network operator implements anti-spoofing filtering to prevent packets with an incorrect source IP address from entering and leaving the network. Facilitate global operational communication and coordination between the network operators Network operators should maintain globally accessible up-to-date contact information. Facilitate validation of routing information on a global scale. Network operator has publicly documented routing policy, ASNs and prefixes that are intended to be advertised to external parties.