Sorry, you need to enable JavaScript to visit this website.
Skip to main content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.

Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.

The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Cybersecurity

NTIA’s cybersecurity multistakeholder processes, conducted in an open and transparent manner, contribute to the security of the nation’s Internet architecture. The consensus-based development of market-based cybersecurity solutions and guidance creates a foundation for increasing digital security. Recent processes include:

Related content


IPAs On Tap: NTIA’s Role in Cybersecurity Policy

August 23, 2023
For NTIA, one of the primary focuses for cybersecurity work is maintaining the openness of the Internet and its potential for innovation and further technological development. Those priorities can apply to cybersecurity policy efforts in a variety of different ways.
Topics

Secure Internet Routing

May 10, 2023

By Bob Cannon, Senior Telecommunications Policy Analyst, NTIA

My name is Bob.  I am number six.

Do you believe me?

If I were wrong… would you know?

In the 1960s television show “The Prisoner,” retired secret agents are held captive in a place known only as “The Village” and assigned numbers to replace their identities.  Protagonist “Number Six” quickly learns that what one claims to be and what one is can be two different things.

Internet routing is a bit like life in The Village.  One network whispers to a second that it is number six.  The second network then tells two other networks that it can send traffic to number six.  And those two networks tell two more networks that they can reach the network that reaches number six.  And so on.  Networks make routing decisions based on these whispers, following the path back to the network that says it is number six.  Sometimes those whispers are right. Sometimes they are wrong. When they are wrong, Internet traffic can go astray.

Subscribe to Cybersecurity RSS feed