1.12 Supporting infrastructure
1.15 Content provisioning exposure
1.16 DNSSEC private key exposure
1.17 Question from the group: "What is the perspective of threat description?"
2.2 1) Compromised credentials (Phishing, Key logger, a.o.)
2.3 2) Compromised credentials, DDOS
2.5 4) Spoofing, poisoning
2.6 ALL) MIM (Man in the middle)
3.1 Poor design (hardware and software)
3.3.2 Geo-political groups
3.5 Implementation errors (hardware and software)
3.9 Informality of some processes
3.10 Inadequate funding (for infrastructure, training, etc.)
3.11 Lack of visibility and understanding by decision-makers
4.2 Single point of failure
4.2.6 Infrastructure (electricity, fiber, etc.)
4.3.2 Hacking/penetration
4.3.3 Data poisoning (MITM, Cache)
5.1 Leverage the DNS and unique identifiers (such as botnets, denial of service attacks, social engineering attacks) for fraud, malicious conduct or route-hijacking attacks
5.2 Threats on the underlying infrastructure. May include:
5.2.1 TLD and registrar failure
5.2.3 Authority or authentication compromise
5.2.4 Government interventions
5.4 Cache poisoning attacks
5.5 Recursive vs authoritative nameserver attacks
5.7 Vulnerability of DNS software, OS, etc.