You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 34 Next »

The DSSA working group is working on a set of threats to DNS security and stability.    This page is where we're tracking our work.

Document types:

PDF -- these are read-only files that allow navigation of the mind-map -- later versions are expandable, but they must be opened in Adobe Reader 9 or later

MMAP -- these are the editable mind-map files -- can be loaded directly into Mindjet's MindManager product or imported into the open-source Freemind program

MM -- these are also mind-map files -- we switched to using Freemind for our work (thus avoiding the cost and complexity of Mindjet's product) in early January 2012

HTML -- these are straight text html files that can be read by any web browser

We began this work at the ICANN general meeting in Singapore (June, 2011).

DSSA - Threats - Singapore -- as a PDF of the mind-map

DSSA - Threats - Singapore -- as a web-page outline of the charts

Results from the 11-August teleconference

DSSA - Threats - combined v1 -- as a PDF of the mind-map

DSSA - Threats - combined -- as a web-page outline

Results from the 18-August teleconference

DSSA - Threats - combined v2 -- as a PDF of the mind-map

DSSA - Threats - combined v1 -- as a web-page outline

Results from the 25-August teleconference

DSSA - Threats - combined v4.pdf -- as a PDF of the mind-map   (NOTE: This is a very large map as it contains all of the summaries of the SSAC reports and RFCs we reviewed on the call today -- you may find it hard to read or follow)

DSSA - Threats - combined v4v.pdf -- as a PDF of the mind-map   (NOTE: This file is the first one that contains an imbedded viewer so that you can open or close branches of the mind-map, but must be opened in Adobe Reader 9)

Results from the 1-Sept teleconference

DSSA - Threats - combined v5b.pdf 

DSSA - Threats - combined v5.mmap  

FORK -- Splitting this page, and the documentation, into a narrower focus (to reduce file sizes and complexity)

This page will start focusing on documenting "Threats" -- "Vulnerabilities", "Possible hierarchies" and "Action items" have been split out of the documents and moved to separate pages. 

DSSA - Threats v6v.pdf

DSSA - Threats v6.mmap

DSSA - Threats v6.html

Results from the 8-Sept teleconference

DSSA - Threats v7v.pdf

DSSA - Threats v7.mmap

DSSA - Threats v7.html

Results from the 15-Sept teleconference

DSSA - Threats v8.pdf

DSSA - Threats v8.mmap

DSSA - Threats v8.html

Results from the 22-Sept teleconference (first-pass sifting of threats that are in/out of scope)

DSSA - Threats v9.pdf

DSSA - Threats v9.mmap

DSSA - Threats v9.html

DSSA -- Summary of scope decisions.pdf

Results from the 6-Oct teleconference

DSSA - Threats v12.pdf

DSSA - Threats v12.mmap

DSSA - Threats v12.html

Results from the 22-Dec teleconference (returning to the threat-tree after a pause to sort out the methodology -- these are mind maps of the threat-tree under the NIST methodology, rather than the previous series of maps which originated at our meeting in Singapore)

DSSA -- Risk assessment -- threat event tree - v3.pdf

DSSA -- Risk assessment -- threat event tree - v3.mmap

DSSA -- Risk assessment -- threat event tree - v3.html

Results from the 5-Jan-2012 teleconference

DSSA -- Risk assessment -- threat event tree - v4.pdf

DSSA -- Risk assessment -- threat event tree - v4.mmap

DSSA -- Risk assessment -- threat event tree - v4.html

Results from the 12-Jan teleconference (Note: we've started recording the results in two forms -- the continuing series of mind-maps, plus spreadsheets that will document our results in the tables defined in the NIST 800-30 methodology)

Mind-map

DSSA -- Risk assessment -- threat event tree - v5.pdf

DSSA -- Risk assessment -- threat event tree - v5.mmap

DSSA - Risk assessment -- threat event tree - v5.mm

DSSA -- Risk assessment -- threat event tree - v5.html

DSSA - Threat-event Architecture v1.mm

DSSA - Threat-event Architecture v1.pdf

Tables

DSSA -- Tables D-8 and E-5 - Non Adversarial Threat Sources and Events v2.xlsx

Results from the 19-Jan teleconference

Mind-map

DSSA - Risk assessment -- threat event tree - v6.mm

DSSA - Risk assessment -- threat event tree - v6.mm.html

Tables

DSSA -- Tables D-8 and E-5 - Non Adversarial Threat Sources and Events v3.xlsx

Results from the 26-Jan teleconference

Mind-map

DSSA - Risk assessment -- threat event tree - v7.mm

DSSA - Risk assessment -- threat event tree - v7.mm.html

Tables

DSSA -- Tables D-8 and E-5 - Non Adversarial Threat Sources and Events v4.xlsx

Results from the 9-Feb teleconference

Mind-map

DSSA - Risk assessment -- threat event tree - v8.pdf

DSSA - Risk assessment -- threat event tree - v8.mm

DSSA - Risk assessment -- threat event tree - v8.mm.html

Tables

DSSA -- Tables D-8 and E-5 - Non Adversarial Threat Sources and Events v5.xlsx

Results from the 16-Feb teleconference

Tables

(note -- the following table may be at end-of-life -- the group had a long discussion this week and we are considering revising our analysis approach)

DSSA -- Tables D-8 and E-5 - Non Adversarial Threat Sources and Events v6.xlsx

(note -- the following table is the first draft of our new approach)

DSSA -- Table E-5 - Threat Events v1.xlsx

Results from the 23-Feb teleconference

DSSA -- Table E-5 - Threat Events v3.xlsx

  • No labels