There are two broad categories -- insider threats and
outsider threats.
- NSI has been hit by both in the recent past
- Insider is the most important
- But "outsider" and "insider" are relative terms
In our case we distinguish three natural boundaries
- the boundary between the registrars and the outside world
- the boundary between coredb and the registrars
- the boundary between coredb and the outside world
In computer security the vulnerabilities and threats
change continuously.
-
Keeping secrets safe requires more work than guarding against damage.