Главная
Study mode:
on
1
Introduction
2
IPv6 Protocols
3
Stateless Address Autoconfiguration
4
Global Privacy Address
5
IPv6 vs IPv4
6
ICMP
7
IP Address Resolution
8
IPv6 Fragments
9
IPv6 Transitions
10
IPv6 Address Space
11
DNSSEC
12
Signatures
13
Bootstrapping Other Protocols
14
DNS SEC
15
I CAN
16
Brand Namespaces
17
The Big Picture
18
Assumptions
19
Adaptive Authentication
20
Network Reputation
21
PayPal
22
Things to think about
23
Trademark
24
Sunrise Period
25
Uniform Rapid Suspension
26
Homographs
27
IDN
28
Safari
29
MN Principle
30
IPv6 and NAT
31
Pros and Cons
Description:
Explore the significant technical shifts in Internet infrastructure and their security implications in this Black Hat USA 2012 conference talk. Delve into the simultaneous overhaul of IPv6, DNSSEC, and the creation of new top-level domains, examining their impact on enterprise IT and risk management. Gain insights into the unexpected secondary effects of these changes and learn why traditional security products and processes may no longer be sufficient. Discover the direct security impacts faced by network administrators, even if they believe they are not yet using these technologies. Investigate how modern fraud, spam, and brand abuse infrastructure are affected by the transition from IPv4 to IPv6 and the expansion of gTLDs. Analyze the implications for monitoring, compliance, intrusion detection and prevention, and the future of enterprise architecture and defense. Explore topics such as stateless address autoconfiguration, global privacy addresses, IP address resolution, IPv6 fragments, DNS SEC signatures, brand namespaces, adaptive authentication, network reputation, and trademark protection in this comprehensive examination of post-scarcity Internet security challenges. Read more

The Myth of Twelve More Bytes - Security on Post-Scarcity Internet

Black Hat
Add to list
0:00 / 0:00