Why use the Database?
Queries
Ascertain custodianship of a resource
Obtain details of technical contacts for a network
Investigate security incidents
Track source of network abuse or “spam” email
Previous slide
Next slide
Back to first slide
View graphic version