Threats
1 Roy
1.1 Natural disaster
1.2 Acts of war/terror
1.3 Bugs
1.4 DOS
1.5 Spam
1.6 Botnets
1.7 Cache poisoning
1.7.1 Kaminsky
1.7.2 Kaspureff
1.8 Spoofing
1.9 M+M
1.10 Fast Flux
1.11 Operational errors
1.12 Supporting infrastructure
1.13 Hackers
1.14 Homogeneity
1.15 Content provisioning exposure
1.16 DNSSEC private key exposure
1.17 Question from the group: "What is the perspective of threat description?"
1.18 Picture
1.18.1
2 Katrina
2.1
2.2 1) Compromised credentials (Phishing, Key logger, a.o.)
2.3 2) Compromised credentials, DDOS
2.4 3) DDOS
2.5 4) Spoofing, poisoning
2.6 ALL) MIM (Man in the middle)
2.7 Picture
2.7.1
3 ???
3.1 Poor design (hardware and software)
3.2 Natural disasters
3.3 Bad players
3.3.1 Organized crime
3.3.2 Geo-political groups
3.3.3 Rogue elements
3.4 Nation states
3.5 Implementation errors (hardware and software)
3.6 Operational errors
3.7 Scalability issues
3.8 Rapid change
3.9 Informality of some processes
3.10 Inadequate funding (for infrastructure, training, etc.)
3.11 Lack of visibility and understanding by decision-makers
3.12 Picture
3.12.1
4 Olivier
4.1 Physical
4.1.1 Terrorism
4.1.2 Facility security
4.2 Single point of failure
4.2.1 Topology
4.2.2 Service providers
4.2.3 Software
4.2.4 Hardware
4.2.5 Geo location
4.2.6 Infrastructure (electricity, fiber, etc.)
4.3 Targeted attack
4.3.1 DDOS
4.3.2 Hacking/penetration
4.3.3 Data poisoning (MITM, Cache)
4.4 Alternate DNS roots
4.5 DNS blocking
4.6 Political
4.6.1 State-sponsored
4.6.2 Hacktivism
4.7 Picture
4.7.1
5 Mark
5.1 Leverage the DNS and unique identifiers (such as botnets, denial of service attacks, social engineering attacks) for fraud, malicious conduct or route-hijacking attacks
5.2 Threats on the underlying infrastructure. May include:
5.2.1 TLD and registrar failure
5.2.2 Disasters
5.2.3 Authority or authentication compromise
5.2.4 Government interventions
5.2.5 (FY12)
5.3 Needs to border DNS
5.4 Cache poisoning attacks
5.5 Recursive vs authoritative nameserver attacks
5.6 Reflection attacks
5.7 Vulnerability of DNS software, OS, etc.
5.8 DDOS attacks
5.9 Physical disasters
5.10 IDN attacks