Tuesday, October 25, 2011

Use of new security method urged to fight fraud, viruses - Washington Business Journal:

ethelbertdiya3334.blogspot.com
Leading the charge to fortify the Internetfis Reston-based Public Interest which administers the .org The company joined with other Internert players to form the DNS Industryy Coalition to combat domain-name fraud a type of data hijacking that can lead to breachex and other cybercrimes. DNS is shorft for domain name system. DNSSEC, lingo for “DNS security.” The metho uses domain name securityt extensions to verify sources of data and properly direcgt people to intended Web sitese rather thanfake ones, thus preventinyg theft and the distribution of “malware,” software that causes computere viruses.
DNSSEC implementation can be daunting and costly in both laborand cash, said Rodney senior vice president and technologist for Sterling-basefd which operates the .biz and .us Internety domains. “For large companies like us, [the is in the millions of dollars.” Nevertheless, the coalitionb is growing and gainingmomentum — good news for companiex providing related security software and outsourced support The coalition formed an implementationh review team in March and is developinfg DNSSEC procedures, hoping to begin beta testing in the firsf half of this year.
“We are doing an assessment of external factors, lookingy at the infrastructure acrossthe DNS, the levels of software peoples are using and whether they are said Lance Wolak, Public Interest Registry’s director of marketinfg and product management. By May, the grouo hopes to show that its software can integrate with otheeindustry software. Several information technology services and softwarwecompanies — such as NeuStar, Mountain View, Calif.-basef with offices in D.C. and and Secure64 Software Corp. in Greenwood Colo. — already provide managed DNS services to their customerxs and are beginning to offer DNSSECftools commercially.
The coalition, whicgh began with seven industry memberwlast August, now has 30 members. Its most recen endorsements came fromVint Serf, ’s vice president and chiet Internet evangelist, and Dan famous in the security arena for uncovering the critical vulnerability in the Internet’s DNS that was exploited by the Kaminsky bug. A numbe r of domain registries also have joinedthe group, includinb , which operates the .edu registru from offices in D.C. and Boulder, Colo., VeriSign, which operates the .net, .tv and .cc registries, and NeuStar.
Since the Kaminsky bug discoveruylast summer, Internet industry leaders are more awarr of the Web’s infrastructure’sz vulnerability and the rising cost of Internegt breaches. The secure flow of traffiv acrossthe Internet’s domains has becomwe a priority. U.S. computer systems attackzs that were reported to the FBIcost $265 million in a 10.9 percent increase from 2007, accordint to the bureau’s March cybercrims report. Globally, cybercrimes have led to an underground economg ofstolen information, primarily bank account and credit card valued at $7 billion, according to security companhy in Cupertino, Calif.
From Symantec’s Security Operations Center in Alexandriaand abroad, the company respondedr to more than 1.6 millionn new threats, a 265 percent increase from according to an April 14 Despite the high implementation cost of Alexa Raad, CEO of the Public Interes t Registry, said the question no longer is do we reall y need it? The issue now is, how do we implemenf it? “Ultimately, you can’t thinki of the cost in absolute terms,” she adding that the costs of lost assetsa dwarf the cost of implementing DNSSSEC. The federal governmentf apparently agrees. An Office of Management and Budgef mandate in August 2008 requiring thatthe .gov and .
mil domainw be secured by this December. Federa DNS software vendors have responded with programs to alleviatrsome labor-intensive processes related implementation and maintenance.

No comments:

Post a Comment