1. introduction 1.1 note on terminology 2 General security concerns 2.1 risk assessment 2.2 damage 2.3 specific targets 2.3.1 private keys 2.3.2 registry database 2.3.3 financial database 2.3.4 other data 2.4 probability of attacks 2.5 attackers 2.6 Types of attacks 3. Specific architectural considerations 3.1 general 3.2 interaction with registrars -- transitive security breaches 3.3 internal design of the registry 3.3.1 isolated 3.3.2 special internal protocol 3.3.3 standard lan protocols 3.3.4 fully connected 3.4 discussion 3.4.1 architecture 2.4.2 performance issues 4. more detail on protocols 4.1 The slow protocol 4.2 ftp or other access to mission-oriented files 4.3 direct dns 4.4 direct whois 4.5 remote administration 4.6 interactive access 5 key management 5.1 protecting keys 5.2 generating new keys