Cenic.org

Blog: Category Archives: Security

CENIC’s Integrated, Multi-Tool Approach to Network Configuration Management

At the CENIC Biennial Conference, network engineers discussed Network Configuration Management (NCM) at CENIC – how and why it was implemented, the components that comprise it, how it’s used, and its potential for the future.

Three Quick Guidelines to Help Your Organization Stay Safe from RPKI-Related Hacking

Using secure passwords, enabling MFA, and defining those authorized to make changes to your ARIN account can help your institution avoid RPKI-related hacking.

More Reasons to Protect Your Pre-ARIN Legacy IP Addresses with a Legacy Registration Services Agreement

More Reasons to Protect Your Pre-ARIN Legacy IP Addresses with a Legacy Registration Services Agreement

Tags ARIN security

To encourage the registration of legacy IP addresses, ARIN has been offering substantial discounts—via a fee schedule cap—for legacy addresses brought under an agreement, but these discounts will not apply to LRSAs signed after December 2023.

Get Your Cybersecurity Program Up and Running with the Trusted CI Framework

Learn about the Trusted CI Framework, developed by the NSF Cybersecurity Center of Excellence and created to help your scientific research facility overcome the obstacles to standing up a cybersecurity program for its cyberinfrastructure.

Minding Our MANRS: CENIC and Global Internet Routing Security

Learn about CENIC’s participation in the Mutually Agreed Norms for Routing Security (MANRS) initiative, which ensures a more secure Internet that is less likely to experience network routing issues and distributed denial of service attacks.

Routing Security and You: Why does it matter?

Categories Security

With more than ten thousand routing outages reported a year, and as many as 40% of them believed to be malicious, securing your network border is incredibly important. The Border Gateway Protocol (BGP), the standard protocol used to connect networks, was built with minimal security and was designed to trust all network peers.

AMON-SENSS: Scalable and Accurate Detection of Volumetric DDoS Attacks at ISPs

Categories Security

AMON-SENSS is an open-source system for scalable, accurate DDoS detection and signature generation in large networks. This presentation reviews the evolution of the software, how it works, and who it may benefit.

Experiences with Adoption and Implementation of the Trusted CI Framework

Categories Security

The Trusted CI Framework is a resource to help organizations establish and refine their cybersecurity programs. Within Trusted CI’s mission is to lead the development of an NSF Cybersecurity Ecosystem that enables trustworthy science, the Framework fills a gap in emphasizing these programmatic fundamentals.

CENIC & K12HSN Announce Successful DDoS Mitigation Solution to Protect K-12 Schools From Cyberattacks

CENIC & K12HSN Announce Successful DDoS Mitigation Solution to Protect K-12 Schools From Cyberattacks

Categories K-12 Security

CENIC and K12HSN today announced that CENIC’s new defenses against distributed denial of service attacks have provided vital support for California’s K-12 institutions, preventing disruption of online teaching, learning, and operations at a time of increasing reliance on network connectivity due to the COVID-19 pandemic.

CENIC Offering Mitigation Solutions for Volumetric Distributed Denial of Service Attacks

Categories Security

CENIC is now offering its members protection from Distributed Denial of Service (DDoS) attacks, which have the potential to prevent people from accessing online resources, and in the worst cases, to take institutions offline completely.