types of data needed mapped to each policy issue

  • Security
    • Mandatory Reporting of Cybersecurity Incidents above some threshold of seriousness
    • network security posture of individual organizations
      • internal measurements (e.g., device inventory, account auditing, etc...)
      • external measurements (e.g., port scans, topology measurements, border mapping, etc...)
  • Universal Service/Broadband
  • Routing Security
  • End-to-end reachability

Edit | Attach | Watch | Print version | History: r3 < r2 < r1 | Backlinks | Raw View | More topic actions...
Topic revision: r2 - 2018-12-19 - JoshPolterock
 
  • Edit
  • Attach
This site is powered by the TWiki collaboration platform Powered by PerlCopyright © 2008-2024 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki? Send feedback