SOW DNS Related Vulnerabilities Implications on Network Security Essay

Prompt: The domain name system (DNS) protocol plays a critical role in enabling network communications. Before you begin this discussion, consider reviewing the optional resources in the Reading and Resources section of this module, as you may want to use them to support your posts.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Questions: For your initial post, discuss a potential consideration associated with the use of DNS. Frame your consideration in terms of potential impacts to network architecture, organizational security, or technology management. Consider the following DNS-related topics as the focus for your post:

  • Zones: resource record types and/or zone transfers
  • Zones: master (primary) zone versus slave (secondary) zones
  • Public DNS versus private DNS versus split DNS
  • DNS-related vulnerabilities: man-in-the-middle attacks, DNS cache poisoning/DNS spoofing, Kaminsky DNS vulnerability, dynamic DNS update vulnerabilities, or distributed denial of service (DDoS) attacks
  • Static DNS versus dynamic DNS (DDNS)

Resources:

  • A Comparison of DNS Server Types: How To Choose the Right DNS Configuration opens in new window
  • DNS Zones and Zone Files Explained opens in new window
  • What is a DNS Zone file: A Complete Tutorial on Zone File and Its Contents opens in new window
  • Understanding DNS: Essential Knowledge for all IT Professionals opens in new window
  • Secure Domain Name System (DNS) Deployment Guide PDF opens in new window

Still stressed with your coursework?
Get quality coursework help from an expert!