Skip to content

the STAKEHOLDERS

THE CYBER ECOSYSTEM, THE STAKEHOLDERS

Welcome to Layer 2: The Stakeholders. This layer focuses on the various entities involved in the cyber ecosystem, including individuals, organizations, and governments. At Listcrime.com, we emphasize the importance of collaboration among stakeholders to create a unified front against cyber threats. Learn how each stakeholder’s role impacts cybersecurity and how collective efforts can lead to a safer digital environment.

CHATBOT ON PREVENTING AND REPORTING CYBERCRIME

LET US HELP YOU WITH PREVENTING AND REPORTING CYBERCRIME

tHE STAKEHOLDERS OF IP RESOURCES EXPLAINED

The Cyber Ecosystem of Internet Protocol Resources attempts to provide a more holistic and unified view to our approach to cybercrime and cybersecurity. The map below attempts to highlight a variety of different levels of people, processes, technology and physical services that make up our cyber ecosystem, so that we can start to view the internet and its borderless security problems more broadly. As noted in the Challenges of IP Resources, Layer 1, in order to bring security into our digital environment we must first understand the entire cyber ecosystem. The purpose of this website is to highlight each level, people, process, technology and physical services (Cyber Ecosystem) so that we can start to view internet security as a holistic problem that must be approached in its entirety.

The Stakeholders of Internet Protocol Resources, Layer 2 of the cyber ecosystem is a decentralized international multi-stakeholder network of autonomous groups responsible for the management and distribution of Internet number resources such as Internet Protocol (IP) addresses and Autonomous System Numbers (ASNs). There are a wide range of stakeholders involved in the management of IP Resources from civil society, to academia, business, and more, who work together for the public good. 

The Stakeholders of Internet Protocol Resources, Layer 2 are a standards body that makes sure the language, protocols and technology of the Internet are fundamentally the same globally, so that different devices, applications, and network can share and communicate across the globe. The positive note about the governance of the Cyber Ecosystem of Internet Protocol Resources (Internet) is that no one person, organization, or government runs or controls it, however no one person, organization, or government can fix it and therefore no consensus on how to solve its problems.

Simply Put: The Stakeholders role is to oversee the huge and complex interconnected network of unique identifiers that allow computers on the Internet to find one another. The Stakeholders are dedicated to keeping the Internet secure, stable, and interoperable. They help with the governance of DNS, the “universal resolvability” which means wherever you are on the network, you receive the same predictable results each time. They help to coordinate and direct Internet traffic so that compatibility is maintained globally.

MULTI-STAKEHOLDERS EXPLAINED: Internet's resource allocation systems

Uniting Stakeholders in the Dynamic Cyber Ecosystem

Domain Name System (DNS), This system is arguably one of the most important aspects of the Internet. The Domain Name Systems (DNS) is like a phonebook of the Internet. Users access information online through domain names, like google.com or Listcrime.com. DNS translates so your browsers can load Internet resources. (see: WHOIS lookup.icann.org)

Internet information is shattered and reassembled, All data is packets switched, which means data is broken down into small chunks and after it is routed to its destination it is reassembled. The entire process of accessing a website follows a path to a corresponding IP address. When this information isn’t already cached locally, there’s a hierarchy of DNS servers that the request must traverse to unlock that IP. When running smoothly, all of this is invisible to the user.

DNS PROVIDER & PATHWAY EXPLAINED

They provide your Authoritative and Recursive DNS pathway (route or transportation of packets/data in the internet).

The Cyber Ecosystem

KEY DEFINITIONS

An IP address, or simply an “IP,” is a unique address that identifies a device on the Internet or a local network. It allows a system to be recognized by other systems connected via the Internet protocol. There are two primary types of IP address formats used today

IPv4: is the most widely used version of the Internet Protocol. It defines IP addresses in a 32-bit format, which looks like 123.123.123.123.


IPv6 :the successor to IP4 solves the shortage. IPv6 uses 128-bit addresses, which increases the number of possible addresses by an exponential amount.

A distributed system of networks made up of a numerous ISPs, universities, governments, companies and other standalone networks, owned by countries and various other entities, that are linked together in what is called peering (a voluntary interconnection for exchanging internet traffic).

which is the routing framework that allows all these ASN networks to interconnect with each other directly or indirectly, it’s a routing protocol that the internet would not be able to function without it. BGP has two functions: Who I can send package to (reachable) and helps to make the choice on direction.

is a physical and usually neutral location where different IP networks meet to exchange local traffic via a switch.

 where IXP allows networks to interconnect directly.

The Internet directory that translates (maps) Domain names to IP Address (example 10.1.1.10 to Listcrime.com). DNS uses technology like, chain of trust, web of trust. (see: WHOIS lookup.icann.org).

 A secured connection, a standard for cryptographic protection of internet protection of internet connection.

is a security system for DNS, it extends the security by adding additional features like a digital signature to existing DNS records that guarantees the translation of a domain name to the correct IP address (a signature validation to avoid redirection to a false IP address).

Anti-phishing and Anti-spoofing standards

Secures the integrity of email messages. It safeguards both the content and the “envelope” of every message with a digital signature. It stops The Abusers of Internet Protocol Resources Layer 7 from sending messages that pretend to befrom others (spoofing) or altering the content of a message while it is in transit.

it prevents “electronic mailboxes” from accepting messages delivered by unauthorized computer systems. Only messages from systems which are allowed to send messages for a specific domain will get through.

complements SPF and DKIM standards and gives “electronic mailboxes some direction as to how to handle incoming mail messages that do not pass the DKIM or SPF checks. How they prefer any improperly authenticated messages to be handled.

a combination of software and procedures. It is a set of hardware, software, people, policies and procedures that are needed to create, manage, distribute, use, store and revoke digital certificates, PKI also binds keys with users’ identities by means of a Certificate Authority (CA). RPKI, RPZ for security and authentication.

validates your information (signs the keys) and then issues you a digital certificate.

Are used to create a secure channel. An electronic document (contains the public key and information about who the certificate was issued to) that associates the individual identity of a person to the public key associated with it. It’s a digital certificate the uses x.509 PKI standard to verify that a public key belongs to the user.