Internet gatekeepers strengthen security at the root

Commerce, ICANN are beginning deployment of enhancements

The Commerce Department and global Internet authorities will begin deploying a worldwide root system improvement to the Internet this week designed to enhance security in the Internet’s domain name structure.

The Internet Corporation for Assigned Names and Numbers will host a ceremony on June 16 at a high-security data center in Culpeper, Va., to install the first Domain Name System Security Extensions.

During the ceremony in Virginia the first cryptographic digital key used to secure the Internet root zone will be generated and securely stored, according to a news release. Official procedures will be carried out to assure the security of the key.


Related stories

The 3 urgent security concerns you'll have this month


The security extensions system is a cryptographic framework that provides greater assurance to all Internet users so that, when they type in a Web address, there is more confidence they will reach that destination. The security extensions have been in development for more than a year to address a well-known flaw in the Internet that has been exploited by hackers and phishers. The longstanding domain name vulnerability has allowed hackers to misdirect Internet traffic to malicious Web sites.

Commerce, ICANN and Verisign Corp. are involved in a joint effort to deploy the security extensions system, which will be fully deployed globally by July 15.

The key ceremony involves ICANN staff as well as 14 volunteer Trusted Community Representatives, who are representatives of the domain name system in their respective countries. The volunteers are not affiliated with Commerce, ICANN or Verisign.

“The involvement of these independent participants provides transparency of process -- a successful key ceremony is only possible if the Trusted Community Representatives involved are satisfied that all steps were executed accurately and correctly. The ceremony and its associated systems and processes will also be subject to a SysTrust audit,” the news release said.

 

About the Author

Alice Lipowicz is a staff writer covering government 2.0, homeland security and other IT policies for Federal Computer Week.

The Fed 100

Read the profiles of all this year's winners.

Featured

  • Then-presidential candidate Donald Trump at a 2016 campaign event. Image: Shutterstock

    'Buy American' order puts procurement in the spotlight

    Some IT contractors are worried that the "buy American" executive order from President Trump could squeeze key innovators out of the market.

  • OMB chief Mick Mulvaney, shown here in as a member of Congress in 2013. (Photo credit Gage Skidmore/Flickr)

    White House taps old policies for new government makeover

    New guidance from OMB advises agencies to use shared services, GWACs and federal schedules for acquisition, and to leverage IT wherever possible in restructuring plans.

  • Shutterstock image (by Everett Historical): aerial of the Pentagon.

    What DOD's next CIO will have to deal with

    It could be months before the Defense Department has a new CIO, and he or she will face a host of organizational and operational challenges from Day One

  • USAF Gen. John Hyten

    General: Cyber Command needs new platform before NSA split

    U.S. Cyber Command should be elevated to a full combatant command as soon as possible, the head of Strategic Command told Congress, but it cannot be separated from the NSA until it has its own cyber platform.

  • Image from Shutterstock.

    DLA goes virtual

    The Defense Logistics Agency is in the midst of an ambitious campaign to eliminate its IT infrastructure and transition to using exclusively shared, hosted and virtual services.

  • Fed 100 logo

    The 2017 Federal 100

    The women and men who make up this year's Fed 100 are proof positive of what one person can make possibile in federal IT. Read on to learn more about each and every winner's accomplishments.

Reader comments

Thu, Jun 17, 2010 Programmer

A great step in the right direction and the international cooperation is a good sign. However this too will eventually hacked. There needs to be accountability for the perpetrators in that they should not be allowed to hide behind borders or internet anonymity. How is it that Facebook, twit er, Google and so on be able to track our every movement on the web and allow our intimate personal information be put up for sale, but we cannot track down, capture and prosecute the criminals?

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group