YoVDO

The Myth of Twelve More Bytes - Security on Post-Scarcity Internet

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Compliance Courses IPv6 Courses Enterprise Architecture Courses Intrusion Detection Courses Network Administration Courses DNSSec Courses

Course Description

Overview

Explore the significant technical shifts in Internet infrastructure and their security implications in this Black Hat USA 2012 conference talk. Delve into the simultaneous overhaul of IPv6, DNSSEC, and the creation of new top-level domains, examining their impact on enterprise IT and risk management. Gain insights into the unexpected secondary effects of these changes and learn why traditional security products and processes may no longer be sufficient. Discover the direct security impacts faced by network administrators, even if they believe they are not yet using these technologies. Investigate how modern fraud, spam, and brand abuse infrastructure are affected by the transition from IPv4 to IPv6 and the expansion of gTLDs. Analyze the implications for monitoring, compliance, intrusion detection and prevention, and the future of enterprise architecture and defense. Explore topics such as stateless address autoconfiguration, global privacy addresses, IP address resolution, IPv6 fragments, DNS SEC signatures, brand namespaces, adaptive authentication, network reputation, and trademark protection in this comprehensive examination of post-scarcity Internet security challenges.

Syllabus

Introduction
IPv6 Protocols
Stateless Address Autoconfiguration
Global Privacy Address
IPv6 vs IPv4
ICMP
IP Address Resolution
IPv6 Fragments
IPv6 Transitions
IPv6 Address Space
DNSSEC
Signatures
Bootstrapping Other Protocols
DNS SEC
I CAN
Brand Namespaces
The Big Picture
Assumptions
Adaptive Authentication
Network Reputation
PayPal
Things to think about
Trademark
Sunrise Period
Uniform Rapid Suspension
Homographs
IDN
Safari
MN Principle
IPv6 and NAT
Pros and Cons


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube