ISPs commit to new cybersecurity measures
The recommendations from an FCC advisory committee target botnets, domain name fraud and Internet route hijacking
IDG News Service - A group of U.S. Internet service providers, including the four largest, have committed to taking new steps to combat three major cybersecurity threats, based on recommendations from a U.S. Federal Communications Commission advisory committee.
The ISPs, including AT&T, Comcast, Time Warner Cable and Verizon Communications, committed Thursday to implement measures to fight botnets, domain name fraud and Internet route hijacking. The FCC's Communications, Security, Reliability, and Interoperability Council (CSRIC) adopted the recommendations for voluntary action by ISPs the same day.
Eight wired and wireless ISPs, representing about 80% of the broadband subscribers in the U.S., are members of CSRIC and signed on to the recommendations.
"These actions will have a significant positive impact on Internet security," FCC Chairman Julius Genachowski said. "If you own a PC, you'll be significantly better protected against your computer [being] taken over by a bad actor, who could destroy your private files or steal your personal information. If you shop or bank online, you'll be significantly better protected against being directed to an illegitimate website and having your credit card number stolen."
The recommendations preserve the open architecture of the Internet and protect Internet users' privacy, Genachowski said.
The CSRIC recommendations embraced by the ISPs include an antibot code of conduct. ISPs agreed to educate customers about botnets and to take steps to identify botnet activity on their networks. ISPs will also warn customers about botnet infections on their computers and offer assistance to customers with compromised computers, under the code of conduct.
The ISPs also committed to implement a set of best practices to secure the Internet's Domain Name System by implementing DNSSEC, a set of secure protocol extensions designed to prevent DNS spoofing.
CSRIC also recommended that the Internet industry develop an Internet Protocol-route highjacking framework, including new technologies and practices to limit the number of times that Internet traffic is misdirected.
T-Mobile USA, one of the ISPs signing on to the recommendations, called cybersecurity an "extremely important issue." The company supports voluntary, industrywide deployment of DNSSEC, T-Mobile said in a statement.
ISPs will need help from other Internet companies to implement the security measures, said Bob Quinn, AT&T's senior vice president for federal regulatory affairs.
"DNSSEC is predicated upon a chain of trust across the Internet," he wrote in a blog post. "[CSRIC] recommends that key industry segments such as banking, healthcare and others sign their respective domains and that software developers, such as web-browser developers, study how and when to incorporate DNSSEC validation functions into their software."
The botnet recommendations see a "significant role" for other companies, including security software vendors and operating system developers, he added. "Keeping the Internet safe for consumers to browse, transact business and communicate is an important objective not only for AT&T but any other business that operates online," he wrote.
Grant Gross covers technology and telecom policy in the U.S. government for The IDG News Service. Follow Grant on Twitter at GrantGross. Grant's e-mail address is firstname.lastname@example.org.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts