Domain Name System Security Extensions

Masters
Essay
Technology
Pages 8 (2008 words)
Download 0
The initial design of the Domain Name System (DNS) did not comprise of security; but it was devised to be a scalable dispersed system. The Domain Name System Security Extensions (DNSSEC) endeavors to include security, whereas upholding backwards compatibility…

Introduction

It is a collection of extensions to DNS that offer the DNS clients origin verification of DNS data, data reliability and authenticated defiance of existence.
When you spend some time on the Internet either sending e-mail or browsing the Web, you make use of domain name servers without even recognizing it. DNS are an extremely important part of the internet but totally to the user. The DNS structure forms one of the principal and most vigorous distributed databases on the globe. With no DNS, the Internet would fail instantly, thus it must be properly maintained and the proper security system put in place to secure it from people with bad intentions. Similar to the majority of the early Internet protocols, DNS was not meant to bear it does nowadays. It was not made with an Internet-as-ecommerce stage in mind as it is today. It was too not made to deal with cache poisoning, phishers, pharmers, denial-of-service attacks, spammers or any kind of scammer.
DNS reached its twenty-fifth in 2008, and started showing its age with major flaws in the system. Mimoso (2008, p1) says DNS was made as a "modest" substitute of host tables that were applied in keeping track of network machines. The ending outcome was the DNS we have come to recognize and love: a protocol that interprets domain names into IP addresses. ...
Download paper
Not exactly what you need?

Related papers

Mobile IP
The route does not have to be the same in both directions. Therefore, a mobile host needs to have a stable IP address in order to be uniquely identifiable to other Internet hosts. However, when a mobile host moves from one network to another, as shown in Fig. 1, the IP address of an MH will change due to the enforced hierarchical address structure of the Internet. If the MH has only standard IP…
Wireless Security
For companies seeking to expand a computer network or make their employees more mobile, Bluetooth and Wi-Fi can provide a cost-effective way to maximize access to shared data and resources. Major technology companies are behind both standards, and the price and choice of products should only improve. By its nature, wireless access opens up the potential for wireless eavesdropping and data theft.…
Domain Name System Security Extensions
It is a collection of extensions to DNS that offer the DNS clients origin verification of DNS data, data reliability and authenticated defiance of existence.…
Online Security
"This report illustrates that sophisticated computer fraud schemes continue to flourish as financial data migrates to the Internet," said FBI Cyber Division Assistant Director Shawn Henry in a written statement. "It also underscores the need for continued vigilance on the part of law enforcement, businesses, and the home computer user to be aware of these schemes and employ sound security…
Wireless Security. Webased Online Diary System.
This allows users to move freely while continuously having connection to the same resources. It is for this reason that webased online diary system webased online diary systems are the fastest growing form of webased online diary systeming in the U.S. Security issues continue to face Wi-Fi and other webased online diary system markets. By its nature, webased online diary system access opens up the…
Computer system Network Security
The issue of computer security first arose in the 1970s as individuals began to break into telephone systems. As technology advanced in computing, computer systems became targets as well. The need for computer network security system raised when a couple of incidents occurred in the USA. The Federal Bureau of Investigation (FBI) made one of its first arrests related to computer hacking in the…
Biometric Security
While on the one hand the terror attacks are resulting in loss of human lives, the heightened security measures are also causing lot of inconvenience to the people whenever, they have to cross over a boundary, check-in at the airport, attend a ceremony, start a train journey etc. A debate has already started as to what extent the security agencies must be snooping into the lives of people, so that…