Internet governance

Description

The principles, regulations, norms and programs that shape the evolution and use of internet, such as internet domain names management, registries and registrars, according to ICANN/IANA regulations and recommendations, IP addresses and names, name servers, DNS, TLDs and aspects of IDNs and DNSSEC.

Alternative labels

Skill type

knowledge

Skill reusability level

sector-specific

Relationships with occupations

Essential knowledge

Internet governance is an essential knowledge of the following occupations:

ICT security administrator: ICT security administrators plan and carry out security measures to protect information and data from unauthorised access, deliberate attack, theft and corruption.
ICT security manager: ICT security managers propose and implement necessary security updates. They advise, support, inform and provide training and security awareness and take direct action on all or part of a network or system.

ICT network administrator: ICT network administrators maintain operation of a reliable, secure, and efficient data communications network, including LAN, WAN, intranet, and internet. They perform network address assignment, management and implementation of routing protocols such as ISIS, OSPF, BGP, routing table configurations and certain implementations of authentication. They perform maintenance and administration of servers (file servers, VPN gateways, intrusion detection systems), desktop computers, printers, routers, switches, firewalls, phones, IP communications, personal digital assistants, smartphones, software deployment, security updates and patches as well as a vast array of additional technologies inclusive of both hardware and software.

Optional knowledge

Internet governance is optional for these occupations. This means knowing this knowledge may be an asset for career advancement if you are in one of these occupations.

ICT security consultant: ICT security consultants advise and implement solutions to control access to data and programs. They promote a safe exchange of information.

Chief ICT security officer: Chief ICT security officers protect company and employee information against unauthorized access. They also define the Information System security policy, manage security deployment across all Information Systems and ensure the provision of information availability.
Telecommunications manager: Telecommunications managers coordinate telecommunications staff activities for installing, troubleshooting, repairing and maintaining telecommunications equipment and infrastructure. They oversee the research, evaluation and implementation of new technologies and ensure a safe working environment for the employees. They supervise the inventory of supplies as well as user and customer assistance actions.
Ethical hacker: Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vulnerabilities that may result from improper system configuration, hardware or software flaws, or operational weaknesses.
Chief technology officer: Chief technology officers contribute to a company’s technical vision and lead all aspects of technology development, according to its strategic direction and growth objectives. They match technology with business needs.
Chief information officer: Chief information officers define and implement the ICT strategy and governance. They determine necessary resources for the ICT strategy implementation, anticipate ICT market evolutions and company business needs. They contribute to the development of the organisation’s strategic plan and ensure that the ICT infrastructure supports the organisation’s overall operations and priorities.
ICT system administrator: ICT system administrators are responsible for the upkeep, configuration, and reliable operation of computer and network systems, servers, workstations and peripheral devices. They may acquire, install, or upgrade computer components and software; automate routine tasks; write computer programs; troubleshoot; train and supervise staff; and provide technical support. They ensure optimum system integrity, security, backup and performance.
ICT network architect: ICT network architects design the topology and connectivity of ICT network such as hardware, infrastructure, communication and hardware components.

 


 

References

  1. Internet governance – ESCO

 

Last updated on September 20, 2022