Domain Name System Security Extensions - Essay Example

Only on StudentShare

Extract of sample
Domain Name System Security Extensions

It is a collection of extensions to DNS that offer the DNS clients origin verification of DNS data, data reliability and authenticated defiance of existence.
When you spend some time on the Internet either sending e-mail or browsing the Web, you make use of domain name servers without even recognizing it. DNS are an extremely important part of the internet but totally to the user. The DNS structure forms one of the principal and most vigorous distributed databases on the globe. With no DNS, the Internet would fail instantly, thus it must be properly maintained and the proper security system put in place to secure it from people with bad intentions. Similar to the majority of the early Internet protocols, DNS was not meant to bear it does nowadays. It was not made with an Internet-as-ecommerce stage in mind as it is today. It was too not made to deal with cache poisoning, phishers, pharmers, denial-of-service attacks, spammers or any kind of scammer.
DNS reached its twenty-fifth in 2008, and started showing its age with major flaws in the system. Mimoso (2008, p1) says DNS was made as a "modest" substitute of host tables that were applied in keeping track of network machines. The ending outcome was the DNS we have come to recognize and love: a protocol that interprets domain names into IP addresses. ...
Download paper

Summary

The initial design of the Domain Name System (DNS) did not comprise of security; but it was devised to be a scalable dispersed system. The Domain Name System Security Extensions (DNSSEC) endeavors to include security, whereas upholding backwards compatibility…
Author : sage14

Related Essays

Mobile IP
The route does not have to be the same in both directions. Therefore, a mobile host needs to have a stable IP address in order to be uniquely identifiable to other Internet hosts. However, when a mobile host moves from one network to another, as shown in Fig. 1, the IP address of an MH will change due to the enforced hierarchical address structure of the Internet. If the MH has only standard IP stack in its operating system, the TCP connection will break up following this movement. (Mondal, 2003)
...
8 pages (2008 words) Essay
Wireless Security
For companies seeking to expand a computer network or make their employees more mobile, Bluetooth and Wi-Fi can provide a cost-effective way to maximize access to shared data and resources. Major technology companies are behind both standards, and the price and choice of products should only improve. By its nature, wireless access opens up the potential for wireless eavesdropping and data theft. (Johansson et al., 2007)Wi-Fi networks have to be carefully encrypted to prevent unauthorized use. For example, people committing fraud or dealing in illegal materials via the Internet would find...
15 pages (3765 words) Essay
Wireless Security. Webased Online Diary System.
This allows users to move freely while continuously having connection to the same resources. It is for this reason that webased online diary system webased online diary systems are the fastest growing form of webased online diary systeming in the U.S. Security issues continue to face Wi-Fi and other webased online diary system markets. By its nature, webased online diary system access opens up the potential for webased online diary system eavesdropping and data theft. Wi-Fi webased online diary systems have to be carefully encrypted to prevent unauthorized use. For example, people committing...
16 pages (4016 words) Essay
Computer system Network Security
The issue of computer security first arose in the 1970s as individuals began to break into telephone systems. As technology advanced in computing, computer systems became targets as well. The need for computer network security system raised when a couple of incidents occurred in the USA. The Federal Bureau of Investigation (FBI) made one of its first arrests related to computer hacking in the early 1980s3. A group of hackers known as the 414s, named after their area code in Milwaukee, Wisconsin, were indicted for attacking 60 different computer systems including the Los Alamos National...
5 pages (1255 words) Essay
Biometric Security
While on the one hand the terror attacks are resulting in loss of human lives, the heightened security measures are also causing lot of inconvenience to the people whenever, they have to cross over a boundary, check-in at the airport, attend a ceremony, start a train journey etc. A debate has already started as to what extent the security agencies must be snooping into the lives of people, so that it doesn't amount to loss of privacy. While on the one hand the proponents of strict security measures say that it is all being done for the sake of the security of people, there are a number of...
14 pages (3514 words) Essay
Got a tricky question? Receive an answer from students like you! Try us!