An Empirical Study Into Factors That Create Configuration

Total Page:16

File Type:pdf, Size:1020Kb

An Empirical Study Into Factors That Create Configuration An Empirical Study into Factors that Create Configuration Inconsistencies between IPv4 and IPv6 Systems Identifying the Managerial and Scientific Implications D. Rieffe Management of Technology TU Delft Cyber Security & Forensic Technology PwC Nederland An Empirical Study into Factors that Create Configuration Inconsistencies between IPv4 and IPv6 Systems Identifying the Managerial and Scientific Implications by D. Rieffe to obtain the degree of Master of Science at the Delft University of Technology, to be defended publicly on Tuesday September 24, 2019 at 12:30. Student number: 4654862 Project duration: Februari 1, 2019 – September 1, 2019 Thesis committee: Prof. dr. ir. M.F.W.H.A. Janssen TU Delft - ICT and Governance, Chairman Dr.-Ing. T. Fiebig TU Delft - ICT and Governance, Supervisor Prof. dr. ing. A.J Klievink TU Delft - Organization and Governance, Critical Observer D. Switzer PwC Netherlands, External Member An electronic version of this thesis is available at http://repository.tudelft.nl/. Executive Summery This study performed a qualitative analysis of the rising problem of IPv6 misconfiguration. From scans of the public IP ranges of the internet is visible that currently 4,8% of all dual-stack hosts have a different con- figuration on IPv4 than IPv6. However, from an IT security perspective, the reasons for a difference in IP configuration are limited. In this thesis, the IP configuration process is studied. Furthermore, we reached out to the owners of identified misconfigured hosts and discussed with them the reason behind the misconfigu- ration. This goal of this study is to discovering why there are differences in port configuration between IPv4 and IPv6. This thesis aims to increase the literature, knowledge, and awareness levels of IPv6 port configuration. For this, the following research question is drawn: What is the reason for the existence of inconsistencies in open port policies on dual-stack hosts? For answering the main research question, four corresponding sub-questions are drafted. If answered they will aid in answering the main research question. SQ1: What actors play a part in the IPv6 configuration? SQ2: Which guidelines are considered to be most critical for port-based firewalling policies? SQ3: What processes lead to IPv4/IPv6 misconfigurations and inconsistencies that can be found in the wild? SQ4: Is there evidence of active exploitation of IPv6 misconfigurations? Methodology Most literature based on IPv6 port configuration has a technical approach to the problem. However, review- ing the IPv6 configuration from a managerial perspective is lacking. The identified knowledge gap was filled by an exploratory qualitative study. For this, we performed thirteen interviews with IPv6 security experts and owners of identified misconfigured hosts. From these interviews, we got insights on how IP configuration is performed and why IPv6 configuration is often poorly configured. Results The thirteen interviews were transcribed and analyzed with ATLAS.ti. From the interviews, we found that the larger the company, the more formal the port configuration becomes. This process increases the number of reviews, but also time to implement a change. Next, we discovered that there are no real use cases for imple- menting IPv6 and only IT networking enthusiasts prefer to use IPv6. There is IPv4 scarcity but IPv4 lifetime extension technologies (Carrier-Grade NAT and NAT) are currently preferred over implementing IPv6. Discussion and Conclusion In the discussion, we compared our results with current literature. We discuss two reasons for IPv6 implemen- tation, Europol and Rabobank. Secondly, we discuss two methods for organizations to migrate from IPv4 to IPv6. In one case IPv4 is used internally and IPv6 externally, and in the other case the entire network is run- ning IPv6. Thirdly, a comparison is made between existing technology adoption theories and the adoption of IPv6. Also, a similar technology migration on the internet is added in this section. Finally, management awareness and the different actors in the IPv6 landscape are discussed. IPv6 configuration has proven to be a difficult subject. Not all parties are ready for IPv6, and the general awareness and knowledge of IPv6 lacks behind. Thus far, there are little use cases for IPv6 implementation, which results in no priorities on IPv6. Resulting in improper and half configurations of firewalls and differ- ences in open ports on dual-stack hosts. It is expected that in the future, with an increase of cost of IPv4 iii iv Executive Summery extension technologies and IPv4 scarcity, the world will migrate to IPv6. If this increases the knowledge and awareness of IPv6, it is expected that the number of misconfigured devices will decrease. Furthermore, it is essential that besides technicians also managers become aware of this IPv6 problem. Growth in awareness and knowledge concerning IPv6 will be two factors that will greatly reduce the number of mis- configurations. Currently, there is no clear actor who is responsible for addressing this problem to managers. In this study, we discuss that Internet governance agencies, e.g., RIPE, could take this role. Contents List of Figures xi List of Tables xiii 1 Introduction 1 1.1 Focus and Goal..........................................2 1.2 Problem Description.......................................3 1.3 Intended Audience........................................3 1.3.1 Actors...........................................4 1.4 Societal Relevance........................................4 1.5 Management of Technology....................................4 2 Background Knowledge5 2.1 What is Cyber Security......................................5 2.1.1 Vulnerability-Threat-Control Paradigm..........................5 2.2 Malicious Actor..........................................6 2.3 Cyber Security Roles.......................................6 2.4 Common Attack Methods.....................................7 2.4.1 Password Attacks......................................7 2.4.2 Social Engineering.....................................8 2.4.3 Denial of Service......................................8 2.4.4 Vulnarabilities.......................................9 2.4.5 Vulnerabilties and Misconfiguration............................9 2.5 Consequences of a Cyber Attack................................. 10 2.6 History of the Internet...................................... 10 2.7 Internet Governance....................................... 11 2.8 OSI Model............................................. 12 2.9 TCP/IP.............................................. 13 2.9.1 IP Addresses........................................ 13 2.9.2 IP Depletion........................................ 14 2.9.3 Ports............................................ 15 2.9.4 Network Address Translation................................ 15 2.9.5 Carrier-grade NAT..................................... 17 2.10 DNS................................................ 17 2.11 IPv6 transition protocols..................................... 18 2.12 Disabeling IPv6.......................................... 19 3 Methodology 21 3.1 Interviews............................................. 22 3.2 Structured Approach....................................... 23 3.2.1 Qualitative Research.................................... 23 3.3 Ethical Considerations...................................... 23 3.3.1 Confidentiality....................................... 23 3.3.2 Informed Consent..................................... 24 3.3.3 Harm........................................... 24 4 Collecting Qualitative Data 25 4.1 Vulnerable Host Identification.................................. 25 4.2 Ownership Identification..................................... 26 4.3 Internal IPv4/External IPv6 Configuration............................ 28 v vi Contents 4.4 Recruitment........................................... 30 4.4.1 Limitations and Roadblocks................................ 31 4.4.2 Facts and Figures..................................... 31 4.5 Interview Setup.......................................... 32 4.5.1 Interview Phases...................................... 33 4.6 Data Analysis........................................... 33 4.7 Summary of Approach...................................... 34 5 Results 35 5.1 Information Sources....................................... 35 5.2 Security in General........................................ 36 5.3 Port Configuration Process.................................... 37 5.3.1 Opinions.......................................... 38 5.3.2 Verification........................................ 39 5.3.3 IPv6 Port Configuration.................................. 39 5.3.4 Logical Differences..................................... 40 5.3.5 Opinions About Process.................................. 41 5.4 Security Implications....................................... 41 5.4.1 Summary Port Configuration............................... 42 5.5 IPv6 Adoption........................................... 42 5.5.1 Summary Adoption.................................... 44 5.6 IPv6 Implementation Examples.................................. 44 5.7 Internal/External Configuration................................. 45 5.8 Limitations............................................ 46 5.9 Summary Results......................................... 46 6 Discussion 47 6.1 Implementation Cases...................................... 47 6.1.1 Bank Implementation................................... 47 6.1.2 Europol.......................................... 47 6.1.3 Analysis.........................................
Recommended publications
  • The People Who Invented the Internet Source: Wikipedia's History of the Internet
    The People Who Invented the Internet Source: Wikipedia's History of the Internet PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sat, 22 Sep 2012 02:49:54 UTC Contents Articles History of the Internet 1 Barry Appelman 26 Paul Baran 28 Vint Cerf 33 Danny Cohen (engineer) 41 David D. Clark 44 Steve Crocker 45 Donald Davies 47 Douglas Engelbart 49 Charles M. Herzfeld 56 Internet Engineering Task Force 58 Bob Kahn 61 Peter T. Kirstein 65 Leonard Kleinrock 66 John Klensin 70 J. C. R. Licklider 71 Jon Postel 77 Louis Pouzin 80 Lawrence Roberts (scientist) 81 John Romkey 84 Ivan Sutherland 85 Robert Taylor (computer scientist) 89 Ray Tomlinson 92 Oleg Vishnepolsky 94 Phil Zimmermann 96 References Article Sources and Contributors 99 Image Sources, Licenses and Contributors 102 Article Licenses License 103 History of the Internet 1 History of the Internet The history of the Internet began with the development of electronic computers in the 1950s. This began with point-to-point communication between mainframe computers and terminals, expanded to point-to-point connections between computers and then early research into packet switching. Packet switched networks such as ARPANET, Mark I at NPL in the UK, CYCLADES, Merit Network, Tymnet, and Telenet, were developed in the late 1960s and early 1970s using a variety of protocols. The ARPANET in particular led to the development of protocols for internetworking, where multiple separate networks could be joined together into a network of networks. In 1982 the Internet Protocol Suite (TCP/IP) was standardized and the concept of a world-wide network of fully interconnected TCP/IP networks called the Internet was introduced.
    [Show full text]
  • A Long Time Ago, in a Meeting Room Far, Far Away...Or Maybe 17 Years
    A long time ago, in a meeting room far, far away.... ... or maybe 17 years ago, in Houston, Texas... ...work in the IETF began on... DNSSEC For their efforts with DNSSEC, the IETF wishes to thank: Joe Abley - Danny Aerts Alain Aina - Mehmet Akcin Jaap Akerhuis - Mark Andrews Roy Arends - Derek Atkins Rob Austein - Roy Badami Alan Barrett - Doug Barton Rickard Bellgrim - Ray Bellis Steve Bellovin - Dan Bernstein David Blacka - Stéphane Bortzmeyer Eric Brunner-Williams - Len Budney Randy Bush - Bruce Campbell Vint Cerf - K.C. Claffy Alan Clegg - David Conrad Michelle S. Cotton - Olivier Courtay John Crain - Dave Crocker Steve Crocker - Alex Dalitz Joao (Luis Silva) Damas Hugh Daniel - Kim Davies John Dickinson - Vasily Dolmatov Lutz Donnerhacke - Mats Dufberg Francis Dupont - Donald Eastlake Anne-Marie Eklund-Löwinder Howard Eland - Robert Elz Patrik Fältström - Mark Feldman Ondrej Filip - Martin Fredriksson Alex Gall - James M. Galvin Joe Gersch - Demi Getchko Miek Gieben - John Gilmore Steve Goodbarn - James Gould Michael Graff - Chris Griffiths Olafur Gudmundsson - Gilles Guette Andreas Gustafsson Jun-ichiro Itojun Hagino Staffan Hagnell Phillip Hallam-Baker Ilja Hallberg - Bob Halley Cathy Handley - Wes Hardaker Ted Hardie - Ashley Heineman Jeremy Hitchcock - Bernie Hoeneisen Alfred Hoenes - Paul Hoffman Scott Hollenbeck - Russ Housley Geoff Houston - Walter Howard Bert Hubert - Greg Hudson Christian Huitema - Shumon Huque Johan Ihren - Stephen Jacob Jelte Jansen - Rodney Joffe Simon Josefsson - Daniel Kalchev Andris Kalnozols - Dan
    [Show full text]
  • Update 6: Internet Society 20Th Anniversary and Global INET 2012
    Update 6: Internet Society 20th Anniversary and Global INET 2012 Presented is the latest update (edited from the previous “Update #6) on the Global INET 2012 and Internet Hall of Fame. Executive Summary By all accounts, Global INET was a great success. Bringing together a broad audience of industry pioneers; policy makers; technologists; business executives; global influencers; ISOC members, chapters and affiliated community; and Internet users, we hosted more than 600 attendees in Geneva, and saw more than 1,300 participate from remote locations. Global INET kicked off with our pre‐conference programs: Global Chapter Workshop, Collaborative Leadership Exchange and the Business Roundtable. These three programs brought key audiences to the event, and created a sense of energy and excitement that lasted through the week. Of key importance to the program was our outstanding line‐up of keynotes, including Dr. Leonard Kleinrock, Jimmy Wales, Francis Gurry, Mitchell Baker and Vint Cerf. The Roundtable discussions at Global INET featured critical topics, and included more than 70 leading experts engaged in active dialogue with both our in‐room and remote audiences. It was truly an opportunity to participate. The evening of Monday 23 April was an important night of celebration and recognition for the countless individuals and organizations that have dedicated time and effort to advancing the availability and vitality of the Internet. Featuring the Internet Society's 20th Anniversary Awards Gala and the induction ceremony for the Internet Hall of Fame, the importance of the evening cannot be understated. The media and press coverage we have already received is a testament to the historic nature of the Internet Hall of Fame.
    [Show full text]
  • List of Internet Pioneers
    List of Internet pioneers Instead of a single "inventor", the Internet was developed by many people over many years. The following are some Internet pioneers who contributed to its early development. These include early theoretical foundations, specifying original protocols, and expansion beyond a research tool to wide deployment. The pioneers Contents Claude Shannon The pioneers Claude Shannon Claude Shannon (1916–2001) called the "father of modern information Vannevar Bush theory", published "A Mathematical Theory of Communication" in J. C. R. Licklider 1948. His paper gave a formal way of studying communication channels. It established fundamental limits on the efficiency of Paul Baran communication over noisy channels, and presented the challenge of Donald Davies finding families of codes to achieve capacity.[1] Charles M. Herzfeld Bob Taylor Vannevar Bush Larry Roberts Leonard Kleinrock Vannevar Bush (1890–1974) helped to establish a partnership between Bob Kahn U.S. military, university research, and independent think tanks. He was Douglas Engelbart appointed Chairman of the National Defense Research Committee in Elizabeth Feinler 1940 by President Franklin D. Roosevelt, appointed Director of the Louis Pouzin Office of Scientific Research and Development in 1941, and from 1946 John Klensin to 1947, he served as chairman of the Joint Research and Development Vint Cerf Board. Out of this would come DARPA, which in turn would lead to the ARPANET Project.[2] His July 1945 Atlantic Monthly article "As We Yogen Dalal May Think" proposed Memex, a theoretical proto-hypertext computer Peter Kirstein system in which an individual compresses and stores all of their books, Steve Crocker records, and communications, which is then mechanized so that it may Jon Postel [3] be consulted with exceeding speed and flexibility.
    [Show full text]
  • Securing BGP with Bgpsec by Geoff Huston, APNIC and Randy Bush, IIJ
    June 2011 Volume 14, Number 2 A Quarterly Technical Publication for From The Editor Internet and Intranet Professionals The process of adding security to various components of Internet architecture reminds me a little bit of the extensive seismic retrofit- In This Issue ting that has been going on in California for decades. The process is slow, expensive, and occasionally intensified by a strong earthquake after which new lessons are learned. Over the past 13 years this jour- From the Editor ...................... 1 nal has carried many articles about network security enhancements: IP Security (IPSec), Secure Sockets Layer (SSL), Domain Name Securing BGP .......................... 2 System Security Extensions (DNSSEC), Wireless Network Security, and E-mail Security, to name but a few. In this issue we look at rout- ing security again, specifically the efforts underway in the Secure IPv6 Site Multihoming .......... 14 Inter-Domain Routing (SIDR) Working Group of the IETF to provide a secure mechanism for route propagation in the Border Gateway Protocol (BGP). The article is by Geoff Huston and Randy Bush. Reflecting on World IPv6 Day .................... 23 Our second article discusses Site Multihoming in IPv6. Multihoming is a fairly common technique in the IPv4 world, but as part of the devel- opment and deployment of IPv6, several new and improved solutions Letters to the Editor ............. 25 have been proposed. Fred Baker gives an overview of these solutions and discusses the implications of each proposal. Call for Papers ...................... 29 By all accounts, World IPv6 Day was a successful demonstration and an important step toward deployment of IPv6 in the global Internet.
    [Show full text]
  • Africa Internet History: Highlights
    AFRICA INTERNET HISTORY: HIGHLIGHTS Internet Society Galerie Jean-Malbuisson, 15 Tel: +41 22 807 1444 1775 Wiehle Ave. Tel: +1 703 439 2120 InternetSociety.org CH-1204 Geneva Fax: +41 22 807 1445 Suite 201 Fax: +1 703 326 9881 [email protected] Switzerland Reston, VA 20190, USA Contents Section 1: Organizations Section 2: Technologies Section 3: Impact Section 4: African institutions and Internet governance Section 5: Some pioneers Internet Society Galerie Jean-Malbuisson, 15 Tel: +41 22 807 1444 1775 Wiehle Ave. Tel: +1 703 439 2120 InternetSociety.org CH-1204 Geneva Fax: +41 22 807 1445 Suite 201 Fax: +1 703 326 9881 [email protected] Switzerland Reston, VA 20190, USA Introduction This document on the Africa Internet history’s highlights is a collection of information from various sources. It is not a historical document per country but rather a set of global information on the Internet mainly from 1990 to 2001 in Africa Internet Society Galerie Jean-Malbuisson, 15 Tel: +41 22 807 1444 1775 Wiehle Ave. Tel: +1 703 439 2120 InternetSociety.org CH-1204 Geneva Fax: +41 22 807 1445 Suite 201 Fax: +1 703 326 9881 [email protected] Switzerland Reston, VA 20190, USA I Organizations/Initiatives Many international organizations have played an important role in Africa Internet history. Their actions were significant in the area of infrastructure, policy, capacity building and more. This section is trying to summarize some of these actions by international organizations and research centers. Internet Society Galerie Jean-Malbuisson, 15 Tel: +41 22 807 1444 1775 Wiehle Ave. Tel: +1 703 439 2120 InternetSociety.org CH-1204 Geneva Fax: +41 22 807 1445 Suite 201 Fax: +1 703 326 9881 [email protected] Switzerland Reston, VA 20190, USA − Africa Union The New Partnership for Africa's Development (NEPAD) is a programme of the African Union (AU) adopted in Lusaka, Zambia in 2001.
    [Show full text]
  • Signposts in Cyberspace: the Domain Name System and Internet Navigation
    Prepublication Copy—Subject to Further Editorial Correction Signposts in Cyberspace: The Domain Name System and Internet Navigation Committee on Internet Navigation and the Domain Name System: Technical Alternatives and Policy Implications Computer Science and Telecommunications Board Division on Engineering and Physical Sciences NATIONAL ACADEMIES PRESS Washington, D.C. www.nap.edu Prepublication Copy—Subject to Further Editorial Correction THE NATIONAL ACADEMIES PRESS 500 Fifth Street, N.W. Washington, D.C. 20001 NOTICE: The project that is the subject of this report was approved by the Governing Board of the National Research Council, whose members are drawn from the councils of the National Academy of Sciences, the National Academy of Engineering, and the Institute of Medicine. The members of the committee responsible for the report were chosen for their special competences and with regard for appropriate balance. Support for this project was provided by the U.S. Department of Commerce and the National Science Foundation under Grant No. ANI-9909852 and by the National Research Council. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the authors and do not necessarily reflect the views of the National Science Foundation or the Commerce Department. International Standard Book Number Cover designed by Jennifer M. Bishop. Copies of this report are available from the National Academies Press, 500 Fifth Street, N.W., Lockbox 285, Washington, D.C. 20055, (800) 624-6242 or (202) 334-3313 in the Washington metropolitan area. Internet, http://www.nap.edu Copyright 2005 by the National Academy of Sciences. All rights reserved. Printed in the United States of America Prepublication Copy—Subject to Further Editorial Correction The National Academy of Sciences is a private, nonprofit, self-perpetuating society of distinguished scholars engaged in scientific and engineering research, dedicated to the furtherance of science and technology and to their use for the general welfare.
    [Show full text]
  • Visit the National Academies Press Online, the Authoritative Source
    Signposts in Cyberspace: The Domain Name System and Internet Navigation Committee on Internet Navigation and the Domain Name System: Technical Alternatives and Policy Implications, National Research Council ISBN: 0-309-54979-5, 416 pages, 6 x 9, (2005) This free PDF was downloaded from: http://www.nap.edu/catalog/11258.html Visit the National Academies Press online, the authoritative source for all books from the National Academy of Sciences, the National Academy of Engineering, the Institute of Medicine, and the National Research Council: • Download hundreds of free books in PDF • Read thousands of books online, free • Sign up to be notified when new books are published • Purchase printed books • Purchase PDFs • Explore with our innovative research tools Thank you for downloading this free PDF. If you have comments, questions or just want more information about the books published by the National Academies Press, you may contact our customer service department toll-free at 888-624-8373, visit us online, or send an email to [email protected]. This free book plus thousands more books are available at http://www.nap.edu. Copyright © National Academy of Sciences. Permission is granted for this material to be shared for noncommercial, educational purposes, provided that this notice appears on the reproduced materials, the Web address of the online, full authoritative version is retained, and copies are not altered. To disseminate otherwise or to republish requires written permission from the National Academies Press. Signposts in Cyberspace: The Domain Name System and Internet Navigation http://www.nap.edu/catalog/11258.html Signposts in Cyberspace The Domain Name System and Internet Navigation Committee on Internet Navigation and the Domain Name System: Technical Alternatives and Policy Implications Computer Science and Telecommunications Board Division on Engineering and Physical Sciences THE NATIONAL ACADEMIES PRESS Washington, D.C.
    [Show full text]
  • Domains of Convenience: Open Country Code Top-Level Domains And
    DOMAINS OF CONVENIENCE: OPEN COUNTRY CODE TOP-LEVEL DOMAINS AND THE GEOPOLITICS OF INTERNET GOVERNANCE By Kenneth A. Merrill Submitted to the Faculty of the School of Communication of American University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy In Communication Chair: Laura DeNardis, Ph.D. Patricia Aufderheide, Ph.D. Kathryn Montgomery, Ph.D. Derrick Cogburn, Ph.D. Dean of the School of Communication Date 2018 American University Washington, D.C. 20016 © COPYRIGHT by Kenneth A. Merrill 2018 ALL RIGHTS RESERVED DOMAINS OF CONVENIENCE: OPEN COUNTRY CODE TOP-LEVEL DOMAINS AND THE GEOPOLITICS OF INTERNET GOVERNANCE BY Kenneth A. Merrill ABSTRACT This project draws on multiple case studies to investigate the ways in which so-called “open” country code top-level domain names (ccTLDs) (ccTLDs with no local presence requirements) mediate global debates over Internet governance. Specifically, it focuses on three cases in which open ccTLDs became implicated in cross-border controversies over (1) political censorship (wikileaks.ch), (2) intellectual property rights enforcement (rojadirecta.me), and (3) cybercrime (the redelegation of .TK). Using an interpretive comparative approach, the project draws on interviews with ccTLD technical operators, regulators, civil society groups, and users, as well as analysis of relevant documents (e.g. registry and registrar policies, court documents, media reports, and minutes from various governance fora) to examine the outsized role that open ccTLDs play in the networked information economy. Identifying the “commodification of sovereignty” as a key component in the co-production of open ccTLDs, the project draws on a sociotechnical approach to examine the ways in which these country-specific identifiers simultaneously reinforce and undermine notions of sovereignty in cyberspace and the consequences this poses for Internet governance.
    [Show full text]
  • PDF Generated By
    NEGOTIATING INTERNET GOVERNANCE ii Negotiating Internet Governance ROXANA RADU 1 iv 1 Great Clarendon Street, Oxford, OX2 6DP, United Kingdom Oxford University Press is a department of the University of Oxford. It furthers the University’s objective of excellence in research, scholarship, and education by publishing worldwide. Oxford is a registered trade mark of Oxford University Press in the UK and in certain other countries © Roxana Radu 2019 The moral rights of the author have been asserted Published with the support of the Swiss National Science Foundation First Edition published in 2019 Impression: 1 Some rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, for commercial purposes, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, by licence or under terms agreed with the appropriate reprographics rights organization. This is an open access publication, available online and distributed under the terms of a Creative Commons Attribution – Non Commercial – No Derivatives 4.0 International licence (CC BY-NC-ND 4.0), a copy of which is available at http://creativecommons.org/licenses/by-nc-nd/4.0/. Enquiries concerning reproduction outside the scope of this licence should be sent to the Rights Department, Oxford University Press, at the address above Crown copyright material is reproduced under Class Licence Number C01P0000148 with the permission of OPSI and the Queen’s Printer for Scotland Published
    [Show full text]
  • PETALING JAYA, MALAYSIA 18–28 February 2014
    2014 THE ASIA PACIFIC’S PREMIER INTERNET SUMMIT PETALING JAYA, MALAYSIA 18–28 February 2014 Organized by Sunway Resort Hotel & Spa TMBHD00652 Telekom Asia OL.pdf 1 8/29/13 9:29 PM C M Y CM MY CY CMY K Contents APIA Welcome Message 4 APNIC Welcome Message 5 Conference Highlights 6 Venue Layout 8 Conference Timetable 11 List of Speakers 16 Sponsors 17 What next? 18 2014 APRICOT’s backup venue, in times of Network Management, MPLS, and Security. emergency, has traditionally been in Kuala The second week of the APRICOT summit Lumpur, Malaysia; it is centrally located includes tutorials and conference sessions, in our region, easy to travel to for most, with keynotes from Professor Kanchana and has a large number of suitable venues Kanchanasut, Dr Nii Quaynor and Pindar to hold our conference. APNIC, who now Wong. operates the Secretariat on behalf of APIA, agreed to take on the challenge of The APIA Board would like to thank the Welcome Message relocating an almost completely prepared tremendous support which True and conference from Bangkok to Petaling Jaya (a NECTEC have provided to APRICOT in the months of preparation work during 2013. Dear APRICOT Delegate, satellite city of Kuala Lumpur). The Board would also like to thank APNIC As you will no doubt be aware, APRICOT Preparing the venues and infrastructure for for their considerable efforts in moving 2014 was originally intended to be held in a 500+ person conference as diverse and the conference. And the Board would like Bangkok. But with the escalating political varied as ours is no small undertaking and to thank the many volunteers from the protests in Bangkok during December the team, superbly led by Molly Cheam, has community in the APRICOT Management, 2013 and January 2014, and the Thai performed many miracles to make APRICOT Programme, Fellowship and Technical Government’s declaration of a state of 2014 a reality.
    [Show full text]
  • Internet Development in Angola Our Contribution
    Internet Development in Angola Our contribution Silvio Cabral Almada & Haymée Pérez Cogle In 2006 Angola completes ten years of full Internet operation. Although its access is not possible to perform within the parameters of the universality of the four corners of our country, benefits of this technology can be already noticeable in our country. Today is possible to do our banking transactions using the home banking facility, work using remote access, send and receive messages, perform real time text chatting to and from any place, use Chat and Messenger facilities or even talk from PC to PC or from PC to Telephone using Voice over IP such as Skype, download movies, watch movies, watch television, listen to the radio, read newspapers, get scientific information, etc. As everything has a beginning, it is important to know how this technology was introduced in Angola, its background and development. It is the result of many different contributions and here we state our contribution to the introduction of new technologies. As it can be noted through our history, it is clear that love also contributed to the implementation of Internet in this immense and wonderful country. Background In 1989, after completing my studies in Ukraine in the Instituto Superior Politécnico (Polytechnic Superior Institute) of the city of Donesk, as a computer Systems Engineer, I was placed at the Ministério do Plano (Planning Ministry); previously, the State had guaranteed work for bursary students, after completing their studies, however, it happened that, after various unsuccessful contacts to the Planning Ministry (which was indicated as my employer), I decided to look in the labour market for a job.
    [Show full text]