Related Links

  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Top 5 Stories


National CSIRTs want more data on cyber attack methods, responses

27 December 2010

Almost all national computer security incident response teams (CSIRT) surveyed said they would like to receive more information on new cyber attack methods and recommended responses, according to a survey by ICANN.

At the same time, only 15% of CSIRTs surveyed subscribe to any cybersecurity and response mailing lists for domain name system (DNS) registry operators. Those CSIRTs that do not subscribe to mailing lists are interesting in obtaining the following types of information: DNS attack method trends, incident response techniques, DNS spoofing issues, new attack trends and methods of DNS-related incidents and effective response methods, knowledge about new vulnerabilities, case studies, and best practices.

National CSIRTs are government bodies that manage cybersecurity incidents that have national significance, such as criminal activities, espionage, economic interests, and terrorism, and that coordinate responses to cybersecurity threats by the private and public sectors. They also provide information about cybersecurity issues, vulnerabilities, and exploits and work with software vendors to create patches for security vulnerabilities. An example would be the Department of Homeland Security’s United States Computer Emergency Response Team (US-CERT).

For the survey, ICANN – the Internet Corporation for Assigned Names and Numbers – received responses from 26 of the 56 national CSIRTs currently in existence. Of the 26 that responded, 17 said that a contact point database for cybersecurity response and information sharing is needed to improve international incident coordination on cybersecurity issues. Most respondents said they currently use the WHOIS system to find points of contact for cybersecurity issues, despite inaccuracy of the WHOIS data.

Six of the CSIRTs said that an international coordination center is needed to improve incident response on cybersecurity issues.

This article is featured in:
Compliance and Policy  •  Internet and Network Security  •  Public Sector


Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×