the STAKEHOLDERS
THE CYBER ECOSYSTEM, THE STAKEHOLDERS
Welcome to Layer 2: The Stakeholders. This layer focuses on the various entities involved in the cyber ecosystem, including individuals, organizations, and governments. At Listcrime.com, we emphasize the importance of collaboration among stakeholders to create a unified front against cyber threats. Learn how each stakeholder’s role impacts cybersecurity and how collective efforts can lead to a safer digital environment.
CHATBOT ON PREVENTING AND REPORTING CYBERCRIME
LET US HELP YOU WITH PREVENTING AND REPORTING CYBERCRIME
tHE STAKEHOLDERS OF IP RESOURCES EXPLAINED
The Cyber Ecosystem of Internet Protocol Resources attempts to provide a more holistic and unified view to our approach to cybercrime and cybersecurity. The map below attempts to highlight a variety of different levels of people, processes, technology and physical services that make up our cyber ecosystem, so that we can start to view the internet and its borderless security problems more broadly. As noted in the Challenges of IP Resources, Layer 1, in order to bring security into our digital environment we must first understand the entire cyber ecosystem. The purpose of this website is to highlight each level, people, process, technology and physical services (Cyber Ecosystem) so that we can start to view internet security as a holistic problem that must be approached in its entirety.
The Stakeholders of Internet Protocol Resources, Layer 2 of the cyber ecosystem is a decentralized international multi-stakeholder network of autonomous groups responsible for the management and distribution of Internet number resources such as Internet Protocol (IP) addresses and Autonomous System Numbers (ASNs). There are a wide range of stakeholders involved in the management of IP Resources from civil society, to academia, business, and more, who work together for the public good.
The Stakeholders of Internet Protocol Resources, Layer 2 are a standards body that makes sure the language, protocols and technology of the Internet are fundamentally the same globally, so that different devices, applications, and network can share and communicate across the globe. The positive note about the governance of the Cyber Ecosystem of Internet Protocol Resources (Internet) is that no one person, organization, or government runs or controls it, however no one person, organization, or government can fix it and therefore no consensus on how to solve its problems.
- IANA Government
- IEFT
- NRO
- Academia
- Business
- Internet User
- Civil Society
- Technical
Simply Put: The Stakeholders role is to oversee the huge and complex interconnected network of unique identifiers that allow computers on the Internet to find one another. The Stakeholders are dedicated to keeping the Internet secure, stable, and interoperable. They help with the governance of DNS, the “universal resolvability” which means wherever you are on the network, you receive the same predictable results each time. They help to coordinate and direct Internet traffic so that compatibility is maintained globally.
MULTI-STAKEHOLDERS EXPLAINED: Internet's resource allocation systems
Internet Assigned Numbers Authority (IANA)
maintains the global pools of Internet number resources, from which the Regional Internet Registries (RIRs) receive allocations.
Regional Internet Registries (RIRs):
are the direct stakeholders of the IANA Numbering Services. RIRs further distribute this pool to stakeholders in their respective regions. Domain names may be registered with one of the more than two thousand ICANN accredited registrars, or their resellers.
Registrars:
are accredited by (ICANN) organization and certified by the registries to sell domain names. They are bound be the Registrar Accreditation Agreement (RAA) with ICANN organization, and by their agreements with the registries. Resellers are organizations affiliated with or under contract with Registrars to sell domains and other services offered by the registrar such as web hosting or email mailboxes.
Resellers:
They resell IP resources. They are bound by their agreement with the registrars whose services they sell. The registrars remain responsible and accountable for all domain names sold by their resellers.
Internet Engineering Task Force:
The (IETF) is an open standards organization, which develops and promotes voluntary internet standards.
Internet Engineering Task Force:
The (IETF) is an open standards organization, which develops and promotes voluntary internet standards.
International Organization for Standardization (ISO):
is international standards setting body composed of representatives from various national standards organizations.
Number Resource Organization: (NRO)
A coordinating body for the five Regional Internet Registries (RIRs). The RIRs manage the distribution of IP addresses and Autonomous System Numbers (ASNs) in their regions of the world.
Top Level Domain Operators Organizations:
The responsibility for operating each (TLD) (including maintaining a registry of the second-level domains within the TLD is delegated to a particular organization. These organizations are referred to as "registry operators", "sponsors", or simply "delegees."
Root Server Operators:
In total, there are 13 main DNS root servers, each of which is named with the letter’s ‘A’ to ‘M’. They all have a IPv4 address and most have an IPv6 address. Managing the root server is ICANN’s responsibility (Internet Corporation for Assigned Names and Numbers).
The World Wide Web Consortium:
The main international standards organization for the World Wide Web.
The Institute of Electrical and Electronics Engineers (IEEE):
is a professional association for electronic engineering and electrical engineering.
GSMA Association: (GSMA)
(GSMA) is an industry organization that represents the interest of mobile networks operators worldwide.
ITU International Telecommunications Union: (ITU)
(ITU) is a specialized agency of the United Nations representing for all matters related to information and communication technologies.
The Internet Governance Forum (IGF)
(IGF) is a global multi-stakeholder platform that facilitates the discussion of public policy issues pertaining to the Internet governance.
National ICT Ministries:
The Ministry of Information and Communications Technology and National Guidance was established with a mandate of providing strategic and technical leadership, overall coordination, support and advocacy on all matters of policy, laws, regulations and strategy for the ICT sector.
Network Operators Group:
Internet network operators’ groups (NOGs) are informal, country-based, or regional groups that exist to provide forums for Internet network operators to discuss matters of mutual interest, usually through a combination of mailing lists and annual conferences.
World Economic Forum (WEF):
is committed to the improvement of the state of the world by engaging business, political, academic, and other leaders of society to shape global, regional and industry agendas.
The Organization for Economic Co-operation and Development (OECD):
(OECD): is an intergovernmental economic organization with 37 member countries, founded in 1961 to stimulate economic progress and world trade. The OECD is an international organization focusing on economic and social prosperity
Law Enforcement Agencies:
Department of Justice, Department of Treasury, Department of Homeland Security, Europol, Interpol and other Country Law Enforcement agencies
United Nations Educational, Scientific and Cultural Organization (UNESCO):
It seeks to build peace through international cooperation in Education, the Sciences and Culture. UNESCO's programs contribute to the achievement of the Sustainable Development Goals defined in Agenda 2030, adopted by the UN General Assembly in 2015.
Uniting Stakeholders in the Dynamic Cyber Ecosystem
Domain Name System (DNS), This system is arguably one of the most important aspects of the Internet. The Domain Name Systems (DNS) is like a phonebook of the Internet. Users access information online through domain names, like google.com or Listcrime.com. DNS translates so your browsers can load Internet resources. (see: WHOIS lookup.icann.org)
Internet information is shattered and reassembled, All data is packets switched, which means data is broken down into small chunks and after it is routed to its destination it is reassembled. The entire process of accessing a website follows a path to a corresponding IP address. When this information isn’t already cached locally, there’s a hierarchy of DNS servers that the request must traverse to unlock that IP. When running smoothly, all of this is invisible to the user.
DNS PROVIDER & PATHWAY EXPLAINED
They provide your Authoritative and Recursive DNS pathway (route or transportation of packets/data in the internet).
- They provide answers to recursive DNS nameservers about where specific websites can be found. the authoritative DNS server is the final holder of the IP of the domain you are looking for. When you write a domain name in your browser, a DNS query is sent to your ISP’s recursive server, which if doesn’t have the needed information cached in its memory it will get the IP address from an authoritative DNS server
- Recursive name servers are the “middlemen” between authoritative servers and end-users because they must recurse up the DNS tree to reach the name servers authoritative for storing the domain’s records. Recursive name servers are commonly referred to as resolving servers, and usually are your ISP (Internet Service Provider) or specialty resolving DNS providers. For example, DYN, AWS, Akamai, Cloudflare, Google runs their own public recursive DNS servers. In some countries the registry/registrar have been known to be a University, Telcom/ISP or even a government entity.
- Where is the content being hosted? The hosting provider can provide the name of the Nameserver.
- Who is the registrar or reseller? Who did you get your domain from?
- Who controls the DNS pathway/Nameservers? The DNS nameserver acts like a switchboard for your domain, the information on a DNS name server provides the direction to the physical hosting of a website. Which nameserver or company answers DNS request for your website? (i.e., short TTL)
The Cyber Ecosystem
KEY DEFINITIONS
An IP address, or simply an “IP,” is a unique address that identifies a device on the Internet or a local network. It allows a system to be recognized by other systems connected via the Internet protocol. There are two primary types of IP address formats used today
IPv4: is the most widely used version of the Internet Protocol. It defines IP addresses in a 32-bit format, which looks like 123.123.123.123.
IPv6 :the successor to IP4 solves the shortage. IPv6 uses 128-bit addresses, which increases the number of possible addresses by an exponential amount.
A distributed system of networks made up of a numerous ISPs, universities, governments, companies and other standalone networks, owned by countries and various other entities, that are linked together in what is called peering (a voluntary interconnection for exchanging internet traffic).
which is the routing framework that allows all these ASN networks to interconnect with each other directly or indirectly, it’s a routing protocol that the internet would not be able to function without it. BGP has two functions: Who I can send package to (reachable) and helps to make the choice on direction.
is a physical and usually neutral location where different IP networks meet to exchange local traffic via a switch.
where IXP allows networks to interconnect directly.
The Internet directory that translates (maps) Domain names to IP Address (example 10.1.1.10 to Listcrime.com). DNS uses technology like, chain of trust, web of trust. (see: WHOIS lookup.icann.org).
A secured connection, a standard for cryptographic protection of internet protection of internet connection.
is a security system for DNS, it extends the security by adding additional features like a digital signature to existing DNS records that guarantees the translation of a domain name to the correct IP address (a signature validation to avoid redirection to a false IP address).
Anti-phishing and Anti-spoofing standards
Secures the integrity of email messages. It safeguards both the content and the “envelope” of every message with a digital signature. It stops The Abusers of Internet Protocol Resources Layer 7 from sending messages that pretend to befrom others (spoofing) or altering the content of a message while it is in transit.
it prevents “electronic mailboxes” from accepting messages delivered by unauthorized computer systems. Only messages from systems which are allowed to send messages for a specific domain will get through.
complements SPF and DKIM standards and gives “electronic mailboxes some direction as to how to handle incoming mail messages that do not pass the DKIM or SPF checks. How they prefer any improperly authenticated messages to be handled.
a combination of software and procedures. It is a set of hardware, software, people, policies and procedures that are needed to create, manage, distribute, use, store and revoke digital certificates, PKI also binds keys with users’ identities by means of a Certificate Authority (CA). RPKI, RPZ for security and authentication.
validates your information (signs the keys) and then issues you a digital certificate.
Are used to create a secure channel. An electronic document (contains the public key and information about who the certificate was issued to) that associates the individual identity of a person to the public key associated with it. It’s a digital certificate the uses x.509 PKI standard to verify that a public key belongs to the user.