Domain Name System Security Extensions - Essay Example

Only on StudentShare

Extract of sample
Domain Name System Security Extensions

It is a collection of extensions to DNS that offer the DNS clients origin verification of DNS data, data reliability and authenticated defiance of existence.
When you spend some time on the Internet either sending e-mail or browsing the Web, you make use of domain name servers without even recognizing it. DNS are an extremely important part of the internet but totally to the user. The DNS structure forms one of the principal and most vigorous distributed databases on the globe. With no DNS, the Internet would fail instantly, thus it must be properly maintained and the proper security system put in place to secure it from people with bad intentions. Similar to the majority of the early Internet protocols, DNS was not meant to bear it does nowadays. It was not made with an Internet-as-ecommerce stage in mind as it is today. It was too not made to deal with cache poisoning, phishers, pharmers, denial-of-service attacks, spammers or any kind of scammer.
DNS reached its twenty-fifth in 2008, and started showing its age with major flaws in the system. Mimoso (2008, p1) says DNS was made as a "modest" substitute of host tables that were applied in keeping track of network machines. The ending outcome was the DNS we have come to recognize and love: a protocol that interprets domain names into IP addresses. ...Show more

Summary

The initial design of the Domain Name System (DNS) did not comprise of security; but it was devised to be a scalable dispersed system. The Domain Name System Security Extensions (DNSSEC) endeavors to include security, whereas upholding backwards compatibility…
Author : sage14
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Domain Name System Security Extensions"
with a personal 20% discount.
Grab the best paper

Related Essays

Mobile IP
Popular transport protocols, such as TCP (Allman et al., 1999), keep track of their internal session state between the communicating endpoints by using the IP address of the two endpoints and their port numbers. On the other hand, IP addresses are also used to find a route between the endpoints.
8 pages (2000 words) Essay
Wireless Security
The wireless network market is a high-growth area with businesses eagerly wanting all the benefits that wireless can offer. Wireless networking is fast becoming a viable alternative for entities that can utilize the advantages it provides.
15 pages (3750 words) Essay
Wireless Security. Webased Online Diary System.
Webased online diary system technologies allow us to finally connect multiple users to share Internet connections without messy and expensive cable installation procedures. WLAN webased online diary systems make available always-on-webased online diary system connectivity without the restriction of sitting at your desk.
16 pages (4000 words) Essay
Computer system Network Security
Information lost is regarded as financial loss. As organisations are implementing paperless media and computerizing data the need for securing data at various stages become essential. Data is stored in various modes both online and offline1. The data stored online and offline opens up a threat by falling trap to potential hackers who intrude into our systems or network
5 pages (1250 words) Essay
Biometric Security
The 9/11 attacks on WTC twin towers in the heart of the US, the bomb blasts in London, the 26/11 attacks in India are some of the heinous acts of terror which have forced the security agencies around the world to go for foolproof security measures. But this is resulting in double whammy for the common people.
14 pages (3500 words) Essay
Safety at construction sites
Instead, the entire conduct of the project would have to be considered. Among the important aspects of project management is the concern for the safety of people working on the project and the people who will be going to visit the project - whether regularly or not - as soon as it is occupied by its owners and their clients.
3 pages (750 words) Essay
Analyzing and Identifying opportunities in high technologies
In terms of the new technology, the article How is Technology Change Creating New Opportunities in Integrated Circuits (ICs) and Electronic System? 3rd Session states everyone can have the opportunity to compare the old technology with the new technology. With the new technology, one can improve on the current technologies.
10 pages (2500 words) Essay
Find out how much would it cost
to get a custom paper written by a pro under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT